{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:16:38Z","timestamp":1725567398946},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642160738"},{"type":"electronic","value":"9783642160745"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16074-5_12","type":"book-chapter","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T10:11:51Z","timestamp":1286273511000},"page":"164-184","source":"Crossref","is-referenced-by-count":5,"title":["AnBx - Security Protocols Design and Verification"],"prefix":"10.1007","author":[{"given":"Michele","family":"Bugliesi","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Modesti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"12_CR1","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D. Basin","year":"2005","unstructured":"Basin, D., M\u00f6dersheim, S., Vigan\u00f2, L.: OFMC: A symbolic model checker for security protocols. International Journal of Information Security\u00a04(3), 181\u2013208 (2005)","journal-title":"International Journal of Information Security"},{"key":"12_CR2","first-page":"194","volume-title":"Foundations of Security Analysis and Design V","author":"S. M\u00f6dersheim","year":"2009","unstructured":"M\u00f6dersheim, S., Vigan\u00f2, L.: The open-source fixed-point model checker for symbolic analysis of security protocols. In: Foundations of Security Analysis and Design V, p. 194. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: Rfc2246: The TLS protocol version 1.0. Internet RFCs (1999)","key":"12_CR3","DOI":"10.17487\/rfc2246"},{"key":"12_CR4","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1145\/325694.325734","volume-title":"Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages","author":"M. Abadi","year":"2000","unstructured":"Abadi, M., Fournet, C., Gonthier, G.: Authentication primitives and their compilation. In: Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 302\u2013315. ACM, New York (2000)"},{"doi-asserted-by":"crossref","unstructured":"Bugliesi, M., Focardi, R.: Language Based Secure Communication. In: IEEE 21st Computer Security Foundations Symposium, CSF 2008, pp. 3\u201316 (2008)","key":"12_CR5","DOI":"10.1109\/CSF.2008.17"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/11787006_8","volume-title":"Automata, Languages and Programming","author":"P. Adao","year":"2006","unstructured":"Adao, P., Fournet, C.: Cryptographically Sound Implementations for Communicating Processes. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 83\u201394. Springer, Heidelberg (2006)"},{"key":"12_CR7","first-page":"170","volume-title":"CSF 2007","author":"R. Corin","year":"2007","unstructured":"Corin, R., D\u00e9nielou, P.M., Fournet, C., Bhargavan, K., Leifer, J.J.: Secure implementations of typed session abstractions. In: CSF 2007, pp. 170\u2013186. IEEE, Los Alamitos (2007)"},{"doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Corin, R., D\u00e9nielou, P.M., Fournet, C., Leifer, J.J.: Cryptographic protocol synthesis and verification for multiparty sessions. In: CSF 2009 (2009)","key":"12_CR8","DOI":"10.1109\/CSF.2009.26"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A. Armando","year":"2005","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P., H\u00e9am, P., Kouchnarenko, O., Mantovani, J., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 281\u2013285. Springer, Heidelberg (2005)"},{"unstructured":"Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Waidner, M.: iKP A Family of Secure Electronic Payment Protocols. In: Proceedings of the 1st USENIX Workshop on Electronic Commerce (1995)","key":"12_CR10"},{"issue":"4","key":"12_CR11","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1109\/49.839936","volume":"18","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Van Herreweghen, E., Waidner, M.: Design, implementation, and deployment of the iKP secure electronic payment system. IEEE Journal on selected areas in communications\u00a018(4), 611\u2013627 (2000)","journal-title":"IEEE Journal on selected areas in communications"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","first-page":"175","volume-title":"Computer Security - ESORICS 1994","author":"U. Maurer","year":"1994","unstructured":"Maurer, U., Schmid, P.: A calculus for secure channel establishment in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875, p. 175. Springer, Heidelberg (1994)"},{"doi-asserted-by":"crossref","unstructured":"van Doorn, L., Abadi, M., Burrows, M., Wobber, E.: Secure network objects. In: Secure Internet Programming, pp. 395\u2013412 (1999)","key":"12_CR13","DOI":"10.1007\/3-540-48749-2_18"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/BFb0028162","volume-title":"Protocol interactions and the chosen protocol attack","author":"J. Kelsey","year":"1998","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Protocol interactions and the chosen protocol attack. LNCS, pp. 91\u2013104. Springer, Heidelberg (1998)"},{"key":"12_CR15","first-page":"31","volume-title":"A hierarchy of authentication specifications","author":"G. Lowe","year":"1997","unstructured":"Lowe, G.: A hierarchy of authentication specifications, pp. 31\u201343. IEEE Computer Society Press, Los Alamitos (1997)"},{"issue":"1","key":"12_CR16","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R. Cramer","year":"2004","unstructured":"Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing(Print)\u00a033(1), 167\u2013226 (2004)","journal-title":"SIAM Journal on Computing(Print)"},{"doi-asserted-by":"crossref","unstructured":"Abadi, M., Needham, R.: Prudent engineering practice for cryptographic protocols. In: Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 122\u2013136 (1994)","key":"12_CR17","DOI":"10.1109\/RISP.1994.296587"},{"doi-asserted-by":"crossref","unstructured":"M\u00f6dersheim, S.: Algebraic properties in alice and bob notation. In: International Conference on Availability, Reliability and Security, pp. 433\u2013440 (2009)","key":"12_CR18","DOI":"10.1109\/ARES.2009.95"},{"key":"12_CR19","first-page":"357","volume-title":"ACM Conference on Computer and Communications Security","author":"M. Backes","year":"2008","unstructured":"Backes, M., Hritcu, C., Maffei, M.: Type-checking zero-knowledge. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM Conference on Computer and Communications Security, pp. 357\u2013370. ACM, New York (2008)"},{"issue":"5","key":"12_CR20","doi-asserted-by":"publisher","first-page":"573","DOI":"10.3233\/JCS-2008-0334","volume":"16","author":"R. Corin","year":"2008","unstructured":"Corin, R., Deni\u00e9lou, P.M., Fournet, C., Bhargavan, K., Leifer, J.J.: A secure compiler for session abstractions. Journal of Computer Security\u00a016(5), 573\u2013636 (2008)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"12_CR21","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s10207-004-0047-7","volume":"4","author":"G. Bella","year":"2005","unstructured":"Bella, G., Massacci, F., Paulson, L.: An overview of the verification of SET. International Journal of Information Security\u00a04(1), 17\u201328 (2005)","journal-title":"International Journal of Information Security"},{"unstructured":"Visa: Visa 3-D Secure Specifications. Technical report (2002)","key":"12_CR22"},{"unstructured":"O\u2019Mahony, D., Peirce, M., Tewari, H.: Electronic payment systems for e-commerce. Artech House Publishers (2001)","key":"12_CR23"},{"key":"12_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/3-540-36532-X_25","volume-title":"Formal analysis of the iKP electronic payment protocols","author":"K. Ogata","year":"2003","unstructured":"Ogata, K., Futatsugi, K.: Formal analysis of the iKP electronic payment protocols. LNCS, pp. 441\u2013460. Springer, Heidelberg (2003)"},{"issue":"1","key":"12_CR25","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1006\/inco.2002.3086","volume":"174","author":"M. Abadi","year":"2002","unstructured":"Abadi, M., Fournet, C., Gonthier, G.: Secure implementation of channel abstractions. Information and computation(Print)\u00a0174(1), 37\u201383 (2002)","journal-title":"Information and computation(Print)"},{"issue":"3","key":"12_CR26","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.tcs.2003.12.023","volume":"322","author":"M. Abadi","year":"2004","unstructured":"Abadi, M., Fournet, C.: Private authentication. Theor. Comput. Sci.\u00a0322(3), 427\u2013476 (2004)","journal-title":"Theor. Comput. Sci."},{"key":"12_CR27","first-page":"251","volume-title":"POPL","author":"M. Bugliesi","year":"2007","unstructured":"Bugliesi, M., Giunti, M.: Secure implementations of typed channel abstractions. In: Hofmann, M., Felleisen, M. (eds.) POPL, pp. 251\u2013262. ACM, New York (2007)"},{"key":"12_CR28","volume-title":"Proceedings of 15th IEEE Computer Security Foundations Workshop","author":"J. Guttman","year":"2002","unstructured":"Guttman, J.: Security protocol design via authentication tests. In: Proceedings of 15th IEEE Computer Security Foundations Workshop. IEEE Computer, Los Alamitos (2002)"},{"key":"12_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/11580850_8","volume-title":"Trustworthy Global Computing","author":"J. Guttman","year":"2005","unstructured":"Guttman, J., Herzog, J., Ramsdell, J., Sniffen, B.: Programming cryptographic protocols. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, vol.\u00a03705, pp. 116\u2013145. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16074-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T03:34:37Z","timestamp":1636601677000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16074-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642160738","9783642160745"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16074-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}