{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T04:09:12Z","timestamp":1741838952955,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642243714"},{"type":"electronic","value":"9783642243721"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24372-1_7","type":"book-chapter","created":{"date-parts":[[2011,9,29]],"date-time":"2011-09-29T09:41:14Z","timestamp":1317289274000},"page":"75-89","source":"Crossref","is-referenced-by-count":1,"title":["Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols"],"prefix":"10.1007","author":[{"given":"Morten","family":"Dahl","sequence":"first","affiliation":[]},{"given":"Naoki","family":"Kobayashi","sequence":"additional","affiliation":[]},{"given":"Yunde","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Hans","family":"H\u00fcttel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"7_CR1","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1145\/324133.324266","volume":"46","author":"M. Abadi","year":"1999","unstructured":"Abadi, M.: Secrecy by typing in security protocols. JACM\u00a046(5), 749\u2013786 (1999)","journal-title":"JACM"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation\u00a0148(1), 1\u201370 (1999)","journal-title":"Information and Computation"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A.D., Maffeis, S.: Refinement types for secure implementations. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), pp. 17\u201332 (2008)","DOI":"10.1109\/CSF.2008.27"},{"issue":"1","key":"7_CR4","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1145\/1707801.1706350","volume":"45","author":"Karthikeyan Bhargavan","year":"2010","unstructured":"Bhargavan, K., Fournet, C., Gordon, A.D.: Modular verification of security protocol code by typing. In: Proceedings of POPL 2010, pp. 445\u2013456 (2010)","journal-title":"ACM SIGPLAN Notices"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-45789-5_25","volume-title":"Static Analysis","author":"B. Blanchet","year":"2002","unstructured":"Blanchet, B.: From Secrecy to Authenticity in Security Protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 342\u2013359. Springer, Heidelberg (2002)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Bugliesi, M., Focardi, R., Maffei, M.: Analysis of typed analyses of authentication protocols. In: 18th IEEE Computer Security Foundations Workshop (CSFW-18 2005), pp. 112\u2013125 (2005)","DOI":"10.1109\/CSFW.2005.8"},{"issue":"6","key":"7_CR7","doi-asserted-by":"publisher","first-page":"563","DOI":"10.3233\/JCS-2007-15602","volume":"15","author":"M. Bugliesi","year":"2007","unstructured":"Bugliesi, M., Focardi, R., Maffei, M.: Dynamic types for authentication. Journal of Computer Security\u00a015(6), 563\u2013617 (2007)","journal-title":"Journal of Computer Security"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Cremers, C.J.F.: Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In: Proceedings of ACM Conference on Computer and Communications Security (CCS 2008), pp. 119\u2013128 (2008)","DOI":"10.1145\/1455770.1455787"},{"key":"7_CR9","unstructured":"Cremers, C.J.F., Mauw, S.: A family of multi-party authentication protocols - extended abstract. In: Proceedings of WISSEC 2006 (2006)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Dahl, M., Kobayashi, N., Sun, Y., H\u00fcttel, H.: Type-based automated verification of authenticity in asymmetric cryptographic protocols (2011), full version http:\/\/www.kb.ecei.tohoku.ac.jp\/~koba\/papers\/protocol-full.pdf","DOI":"10.1007\/978-3-642-24372-1_7"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Focardi, R., Maffei, M., Placella, F.: Inferring authentication tags. In: Proceedings of the Workshop on Issues in the Theory of Security (WITS 2005). pp. 41\u201349 (2005)","DOI":"10.1145\/1045405.1045410"},{"issue":"5","key":"7_CR12","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/1275497.1275500","volume":"29","author":"C\u00e9dric Fournet","year":"2007","unstructured":"Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. ACM Trans. Prog. Lang. Syst.\u00a029(5) (2007)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/3-540-36532-X_17","volume-title":"Software Security \u2013 Theories and Systems","author":"A.D. Gordon","year":"2003","unstructured":"Gordon, A.D., Jeffrey, A.: Typing one-to-one and one-to-many correspondences in security protocols. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 263\u2013282. Springer, Heidelberg (2003)"},{"issue":"4","key":"7_CR14","doi-asserted-by":"publisher","first-page":"451","DOI":"10.3233\/JCS-2003-11402","volume":"11","author":"A.D. Gordon","year":"2003","unstructured":"Gordon, A.D., Jeffrey, A.: Authenticity by typing for security protocols. Journal of Computer Security\u00a011(4), 451\u2013520 (2003)","journal-title":"Journal of Computer Security"},{"issue":"3-4","key":"7_CR15","doi-asserted-by":"publisher","first-page":"435","DOI":"10.3233\/JCS-2004-123-406","volume":"12","author":"A.D. Gordon","year":"2004","unstructured":"Gordon, A.D., Jeffrey, A.: Types and effects for asymmetric cryptographic protocols. Journal of Computer Security\u00a012(3-4), 435\u2013483 (2004)","journal-title":"Journal of Computer Security"},{"key":"7_CR16","unstructured":"Haack, C., Jeffrey, A.: Cryptyc (2004), http:\/\/www.cryptyc.org\/"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-76637-7_13","volume-title":"Programming Languages and Systems","author":"D. Kikuchi","year":"2007","unstructured":"Kikuchi, D., Kobayashi, N.: Type-based verification of correspondence assertions for communication protocols. In: Shao, Z. (ed.) APLAS 2007. LNCS, vol.\u00a04807, pp. 191\u2013205. Springer, Heidelberg (2007)"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-00590-9_17","volume-title":"Programming Languages and Systems","author":"D. Kikuchi","year":"2009","unstructured":"Kikuchi, D., Kobayashi, N.: Type-based automated verification of authenticity in cryptographic protocols. In: Castagna, G. (ed.) ESOP 2009. LNCS, vol.\u00a05502, pp. 222\u2013236. Springer, Heidelberg (2009)"},{"issue":"5","key":"7_CR19","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1017\/S096012950007002X","volume":"6","author":"B. Pierce","year":"1996","unstructured":"Pierce, B., Sangiorgi, D.: Typing and subtyping for mobile processes. Mathematical Structures in Computer Science\u00a06(5), 409\u2013454 (1996)","journal-title":"Mathematical Structures in Computer Science"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Woo, T.Y., Lam, S.S.: A semantic model for authentication protocols. In: RSP: IEEE Computer Society Symposium on Research in Security and Privacy, pp. 178\u2013193 (1993)","DOI":"10.1109\/RISP.1993.287633"}],"container-title":["Lecture Notes in Computer Science","Automated Technology for Verification and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24372-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T06:03:09Z","timestamp":1741759389000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24372-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642243714","9783642243721"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24372-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}