{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:07:37Z","timestamp":1742915257729,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_18","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T10:22:11Z","timestamp":1291630931000},"page":"251-265","source":"Crossref","is-referenced-by-count":2,"title":["A New Method for Formalizing Optimistic Fair Exchange Protocols"],"prefix":"10.1007","author":[{"given":"Ming","family":"Chen","sequence":"first","affiliation":[]},{"given":"Kaigui","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Pan","family":"He","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/32.502224","volume":"5","author":"R. Kailar","year":"1996","unstructured":"Kailar, R.: Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering\u00a05, 313\u2013328 (1996)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"18_CR2","first-page":"370","volume-title":"International Refinement Workshop and Formal Methods Pacific, Canberra, Australia","author":"J. Zhou","year":"1998","unstructured":"Zhou, J., Gollmann, D.: Towards verification of non-repudiation protocols. In: International Refinement Workshop and Formal Methods Pacific, Canberra, Australia, pp. 370\u2013380. Springer, Heidelberg (1998)"},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/S0304-3975(01)00141-4","volume":"2","author":"V. Shmatikov","year":"2002","unstructured":"Shmatikov, V., Mitchell, J.C.: Finite-state analysis of two contract signing protocols. Theoretical Computer Science\u00a02, 419\u2013450 (2002)","journal-title":"Theoretical Computer Science"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"399","DOI":"10.3233\/JCS-2003-11307","volume":"3","author":"S. Kremer","year":"2003","unstructured":"Kremer, S., Raskin, J.: A game-based verification of non-repudiation and fair exchange protocols. Journal of Computer Security\u00a03, 399\u2013429 (2003)","journal-title":"Journal of Computer Security"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Cederquist, J., Torabi Dashti, M.: An intruder model for verifying termination in security protocols. Technical Report 05-29, CTIT, University of Twente, Enschede, The Netherlands (2005)","DOI":"10.1145\/1180337.1180340"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-75101-4_22","volume-title":"Computer Safety, Reliability, and Security","author":"S. Basagiannis","year":"2007","unstructured":"Basagiannis, S., Katsaros, P., Pombortsis, A.: Intrusion Attack Tactics for the model checking of e-commerce security guarantees. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol.\u00a04680, pp. 238\u2013251. Springer, Heidelberg (2007)"},{"key":"18_CR7","unstructured":"Asokan, N.: Fairness in Electronic Commerce. PhD thesis, University of Waterloo (1998)"},{"key":"18_CR8","first-page":"86","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy","author":"N. Asokan","year":"1998","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Asynchronous protocols for optimistic fair exchange. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 86\u201399. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/3-540-48405-1_29","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"J.A. Garay","year":"1999","unstructured":"Garay, J.A., Jakobsson, M., MacKenzie, P.: Abuse-free optimistic contract signing. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 449\u2013466. Springer, Heidelberg (1999)"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1093\/comjnl\/46.1.55","volume":"1","author":"H. Pagnia","year":"2003","unstructured":"Pagnia, H., Vogt, H., G\u00e4rtner, F.C.: Fair Exchange. The Computer Journal\u00a01, 55\u201376 (2003)","journal-title":"The Computer Journal"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"441","DOI":"10.3233\/JCS-2006-14504","volume":"5","author":"G. Wang","year":"2006","unstructured":"Wang, G.: Generic non-repudiation protocols supporting transparent off-line TTP. Journal of Computer Security\u00a05, 441\u2013467 (2006)","journal-title":"Journal of Computer Security"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.cose.2008.07.005","volume":"10","author":"J.L. Hernandez-Ardieta","year":"2008","unstructured":"Hernandez-Ardieta, J.L., Gonzalez-Tablas, A.I., Alvarez, B.R.: An optimistic fair exchange protocol based on signature policies. Computers & Security\u00a010, 309\u2013322 (2008)","journal-title":"Computers & Security"},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1360\/122004-30","volume":"4","author":"S. Qing","year":"2005","unstructured":"Qing, S., Li, G.: A formal model of fair exchange protocols. Science in China Ser. F Information Sciences\u00a04, 499\u2013512 (2005)","journal-title":"Science in China Ser. F Information Sciences"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"2","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a02, 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Syverson, P.F., Van Oorschot, P.C.: An unified cryptographic protocol logic. NRL Publication 5540-227, Naval Research Lab, Washington, DC, USA (1996)","DOI":"10.21236\/ADA464967"},{"key":"18_CR16","unstructured":"Zhou, J., Gollmann, D.A.: Fair non-repudiation protocol. In: Proc. of the 1996 IEEE Symp. on Security and Privacy, Oakland, CA, pp. 55\u201361 (1996)"},{"key":"18_CR17","unstructured":"Kim, K., Park, S., Baek, J.: Improving fairness and privacy of Zhou-Gollmann\u2019s fair non-repudiation protocol. In: Proc. of the 1999 ICPP Workshop on Security (IWSEC), Aizu, Japan, pp. 140\u2013145 (1999)"},{"key":"18_CR18","volume-title":"Model Checking","author":"E.M. Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)"},{"key":"18_CR19","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"1","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions in Computer systems\u00a01, 18\u201336 (1990)","journal-title":"ACM Transactions in Computer systems"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. Journal of the ACM, 374\u2013382 (1985)","DOI":"10.1145\/3149.214121"},{"key":"18_CR21","first-page":"54","volume-title":"11th IEEE Computer Security Foundations Workshop","author":"S.A. Schneider","year":"1998","unstructured":"Schneider, S.A.: Formal analysis of a non-repudiation protocol. In: 11th IEEE Computer Security Foundations Workshop, Washington- Brussels-Tokyo, pp. 54\u201365. IEEE, Los Alamitos (1998)"},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1145\/1151414.1151416","volume":"2","author":"G. Bella","year":"2006","unstructured":"Bella, G., Paulson, L.C.: Accountability protocols: Formalized and verified. ACM Trans. Inf. Syst. Secur.\u00a02, 138\u2013161 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:17:40Z","timestamp":1566764260000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}