{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:16:38Z","timestamp":1725567398412},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642160738"},{"type":"electronic","value":"9783642160745"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16074-5_10","type":"book-chapter","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T10:11:51Z","timestamp":1286273511000},"page":"130-145","source":"Crossref","is-referenced-by-count":1,"title":["Match It or Die: Proving Integrity by Equality"],"prefix":"10.1007","author":[{"given":"Matteo","family":"Centenaro","sequence":"first","affiliation":[]},{"given":"Riccardo","family":"Focardi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/3-540-45500-0_4","volume-title":"Theoretical Aspects of Computer Software","author":"M. Abadi","year":"2001","unstructured":"Abadi, M., J\u00fcrjens, J.: Formal eavesdropping and its computational interpretation. In: Kobayashi, N., Pierce, B.C. (eds.) TACS 2001. LNCS, vol.\u00a02215, pp. 82\u201394. Springer, Heidelberg (2001)"},{"issue":"2","key":"10_CR2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s00145-001-0014-7","volume":"15","author":"M. Abadi","year":"2002","unstructured":"Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). JCRYPTOL: Journal of Cryptology\u00a015(2), 103\u2013127 (2002)","journal-title":"JCRYPTOL: Journal of Cryptology"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/3-540-48224-5_32","volume-title":"Automata, Languages and Programming","author":"G. Boudol","year":"2001","unstructured":"Boudol, G., Castellani, I.: Noninterference for concurrent programs. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol.\u00a02076, pp. 382\u2013395. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Centenaro, M., Focardi, R.: Match it or die: Proving integrity by equality (2009), http:\/\/www.dsi.unive.it\/~mcentena\/cf-hash-full.pdf","key":"10_CR4","DOI":"10.1007\/978-3-642-16074-5_10"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-04444-1_4","volume-title":"Computer Security \u2013 ESORICS 2009","author":"M. Centenaro","year":"2009","unstructured":"Centenaro, M., Focardi, R., Luccio, F.L., Steel, G.: Type-based analysis of pin processing apis. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 53\u201368. Springer, Heidelberg (2009)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-00590-9_16","volume-title":"Programming Languages and Systems","author":"D. Demange","year":"2009","unstructured":"Demange, D., Sands, D.: All secrets great and small. In: Castagna, G. (ed.) ESOP 2009. LNCS, vol.\u00a05502, pp. 207\u2013221. Springer, Heidelberg (2009)"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1145\/1375696.1375711","volume-title":"Proceedings of the 3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)","author":"R. Focardi","year":"2008","unstructured":"Focardi, R., Centenaro, M.: Information flow security of multi-threaded distributed programs. In: Proceedings of the 3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS), Tucson, AZ, USA, June 8, pp. 113\u2013124. ACM Press, New York (2008)"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1145\/1328438.1328479","volume-title":"35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL)","author":"P. Laud","year":"2008","unstructured":"Laud, P.: On the computational soundness of cryptographically masked flows. In: Necula, G.C., Wadler, P. (eds.) 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), San Francisco, Ca, USA, January 10-12, pp. 337\u2013348. ACM Press, New York (2008)"},{"key":"10_CR9","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"issue":"5","key":"10_CR10","doi-asserted-by":"publisher","first-page":"517","DOI":"10.3233\/JCS-2009-0352","volume":"17","author":"A. Sabelfeld","year":"2009","unstructured":"Sabelfeld, A., Sands, D.: Declassification: Dimensions and principles. Journal of Computer Security\u00a017(5), 517\u2013548 (2009)","journal-title":"Journal of Computer Security"},{"key":"10_CR11","first-page":"115","volume-title":"Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW)","author":"G. Smith","year":"2001","unstructured":"Smith, G.: A new type system for secure information flow. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW), Cape Breton, Nova Scotia, June 11-13, pp. 115\u2013125. IEEE, Los Alamitos (2001)"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/CSFW.2000.856941","volume-title":"Proceedings of the 13th IEEE Computer Security Foundations Workshop (CSFW)","author":"D. Volpano","year":"2000","unstructured":"Volpano, D.: Secure introduction of one-way functions. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop (CSFW), Cambridge, England, July 3-5, pp. 246\u2013254. IEEE, Los Alamitos (2000)"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/CSFW.1997.596807","volume-title":"Proceedings of the 10th Computer Security Foundations Workshop (CSFW)","author":"D. Volpano","year":"1997","unstructured":"Volpano, D., Smith, G.: Eliminating covert flows with minimum typings. In: Proceedings of the 10th Computer Security Foundations Workshop (CSFW), Rockport, Massachusetts, USA, June 10-12, pp. 156\u2013169. IEEE Computer Society, Los Alamitos (1997)"}],"container-title":["Lecture Notes in Computer Science","Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16074-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T03:34:29Z","timestamp":1636601669000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16074-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642160738","9783642160745"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16074-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}