{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:16:36Z","timestamp":1725567396121},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642160738"},{"type":"electronic","value":"9783642160745"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16074-5_3","type":"book-chapter","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T10:11:51Z","timestamp":1286273511000},"page":"23-40","source":"Crossref","is-referenced-by-count":0,"title":["Secrecy and Authenticity Types for Secure Distributed Messaging"],"prefix":"10.1007","author":[{"given":"Michele","family":"Bugliesi","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Calzavara","sequence":"additional","affiliation":[]},{"given":"Damiano","family":"Macedonio","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"3_CR1","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1145\/324133.324266","volume":"46","author":"M. Abadi","year":"1999","unstructured":"Abadi, M.: Secrecy by typing in security protocols. Journal of the ACM\u00a046(5), 749\u2013786 (1999)","journal-title":"Journal of the ACM"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/11787006_8","volume-title":"Automata, Languages and Programming","author":"P. Ad\u00e3o","year":"2006","unstructured":"Ad\u00e3o, P., Fournet, C.: Cryptographically sound implementations for communicating processes. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 83\u201394. Springer, Heidelberg (2006)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Armando, A., Carbone, R., Compagna, L., Cu\u00e9llar, J., Tobarra, M.L.: Formal analysis of saml 2.0 web browser single sign-on: breaking the saml-based single sign-on for google apps. In: FMSE, pp. 1\u201310 (2008)","DOI":"10.1145\/1456396.1456397"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/10930755_23","volume-title":"Theorem Proving in Higher Order Logics","author":"G. Bella","year":"2003","unstructured":"Bella, G., Longo, C., Paulson, L.C.: Verifying second-level security protocols. In: Basin, D., Wolff, B. (eds.) TPHOLs 2003. LNCS, vol.\u00a02758, pp. 352\u2013366. Springer, Heidelberg (2003)"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1109\/49.839936","volume":"18","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Herreweghen, E.V., Waidner, M.: Design, implementation, and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communications\u00a018, 611\u2013627 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Bugliesi, M., Focardi, R.: Channel abstractions for network security. Mathematical Structures in Computer Science xx, xxx\u2013xxx (2010)","DOI":"10.1017\/S0960129509990247"},{"key":"3_CR7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/CSF.2008.17","volume-title":"Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania","author":"M. Bugliesi","year":"2008","unstructured":"Bugliesi, M., Focardi, R.: Language based secure communication. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, June 23-25, pp. 3\u201316. IEEE Computer Society, Los Alamitos (2008)"},{"issue":"1","key":"3_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. ACM Trans. Comput. Syst.\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."},{"key":"3_CR9","unstructured":"Calzavara, S.: Security Types for Distributed Applications. Master\u2019s thesis, Universit\u00e0 Ca\u2019 Foscari di Venezia (2009)"},{"issue":"2","key":"3_CR10","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.ic.2004.08.003","volume":"196","author":"L. Cardelli","year":"2005","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Secrecy and group creation. Inf. Comput.\u00a0196(2), 127\u2013155 (2005)","journal-title":"Inf. Comput."},{"key":"3_CR11","first-page":"170","volume-title":"20th IEEE Computer Security Foundations Symposium, CSF 2007","author":"R. Corin","year":"2007","unstructured":"Corin, R., Deni\u00e9lou, P.M., Fournet, C., Bhargavan, K., Leifer, J.J.: Secure implementations for typed session abstractions. In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, Venice, Italy, July 6-8, pp. 170\u2013186. IEEE Computer Society, Los Alamitos (2007)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Dilloway, C., Lowe, G.: Specifying secure transport channels. In: CSF, pp. 210\u2013223 (2008)","DOI":"10.1109\/CSF.2008.14"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. ACM Trans. Program. Lang. Syst.\u00a029(5) (2007)","DOI":"10.1145\/1275497.1275500"},{"issue":"3-4","key":"3_CR14","doi-asserted-by":"publisher","first-page":"435","DOI":"10.3233\/JCS-2004-123-406","volume":"12","author":"A.D. Gordon","year":"2004","unstructured":"Gordon, A.D., Jeffrey, A.: Types and effects for asymmetric cryptographic protocols. Journal of Computer Security\u00a012(3-4), 435\u2013483 (2004)","journal-title":"Journal of Computer Security"},{"issue":"5","key":"3_CR15","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1017\/S0960129504004281","volume":"14","author":"M. Hennessy","year":"2004","unstructured":"Hennessy, M., Rathke, J.: Typed behavioural equivalences for processes in the presence of subtyping. Mathematical Structures in Computer Science\u00a014(5), 651\u2013684 (2004)","journal-title":"Mathematical Structures in Computer Science"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Kamil, A., Lowe, G.: Specifying and modelling secure channels in strand spaces. In: Workshop on Formal Aspects of Security and Trust, FAST (2009)","DOI":"10.1007\/978-3-642-12459-4_17"},{"issue":"5","key":"3_CR17","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1145\/330249.330251","volume":"21","author":"N. Kobayashi","year":"1999","unstructured":"Kobayashi, N., Pierce, B.C., Turner, D.N.: Linearity and the pi-calculus. ACM Trans. Program. Lang. Syst.\u00a021(5), 914\u2013947 (1999)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"5","key":"3_CR18","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1017\/S0960129504004323","volume":"14","author":"M. Merro","year":"2004","unstructured":"Merro, M., Sangiorgi, D.: On asynchrony in name-passing calculi. Mathematical Structures in Computer Science\u00a014(5), 715\u2013767 (2004)","journal-title":"Mathematical Structures in Computer Science"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Woo, T.Y.C., Lam, S.S.: A semantic model for authentication protocols. In: IEEE Symposium on Security and Privacy, vol.\u00a0178 (1993)","DOI":"10.1109\/RISP.1993.287633"}],"container-title":["Lecture Notes in Computer Science","Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16074-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T16:26:57Z","timestamp":1685809617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16074-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642160738","9783642160745"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16074-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}