{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T17:00:00Z","timestamp":1725642000618},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272561"},{"type":"electronic","value":"9783642272578"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27257-8_20","type":"book-chapter","created":{"date-parts":[[2011,12,11]],"date-time":"2011-12-11T19:50:42Z","timestamp":1323633042000},"page":"314-335","source":"Crossref","is-referenced-by-count":2,"title":["Formal Analysis of CWA 14890-1"],"prefix":"10.1007","author":[{"given":"Ashar","family":"Javed","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"CEN Workshop Agreement, ftp:\/\/ftp.cenorm.be\/PUBLIC\/CWAs\/e-Europe\/eSign\/cwa14890-01-2004-Mar.pdf"},{"key":"20_CR2","unstructured":"Signature Creation Smart Cards, http:\/\/www.security-technologynews.com\/article\/signature-creation-smart-cards.html"},{"key":"20_CR3","unstructured":"ISO\/IEC 7816-4 Identification cards, Integrated circuit cards Part 4: Organization, security and commands for interchange (November 2004), http:\/\/www.ttfn.net\/techno\/smartcards\/iso7816_4.html"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A. Armando","year":"2005","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drielsma, P., He\u00e1m, P.C., Kouchnarenko, O., Mantovani, J., M\u00f6dersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Vigan\u00f2, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 281\u2013285. Springer, Heidelberg (2005)"},{"key":"20_CR5","unstructured":"AVISPA: Automated Validation of Internet Security Protocols and Applications. FET Open Project IST-2001-39252 (2003), http:\/\/www.avispa-project.org\/"},{"key":"20_CR6","unstructured":"A Security Protocol ANimator for AVISPA, http:\/\/www.irisa.fr\/celtique\/genet\/span\/"},{"key":"20_CR7","unstructured":"Deliverable D2.1: The High Level Protocol Specification Language, http:\/\/www.avispa-project.org\/delivs\/2.1\/d2-1.pdf"},{"key":"20_CR8","unstructured":"Deliverable D2.3: The Intermediate Format, http:\/\/www.avispa-project.org\/delivs\/2.3\/d2-3.pdf"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Basin, D., M\u00f6dersheim, S., Vigano, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security (2004)","DOI":"10.1007\/s10207-004-0055-7"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/11805618_21","volume-title":"Term Rewriting and Applications","author":"M. Turuani","year":"2006","unstructured":"Turuani, M.: The CL-Atse Protocol Analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol.\u00a04098, pp. 277\u2013286. Springer, Heidelberg (2006)"},{"key":"20_CR11","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1007\/978-3-540-30227-8_68","volume-title":"Logics in Artificial Intelligence","author":"A. Armando","year":"2004","unstructured":"Armando, A., Compagna, L.: SATMC: A SAT-Based Model Checker for Security Protocols. In: Alferes, J.J., Leite, J. (eds.) JELIA 2004. LNCS (LNAI), vol.\u00a03229, pp. 730\u2013733. Springer, Heidelberg (2004)"},{"key":"20_CR12","unstructured":"Boichut, Y., Heam, P.-C., Kouchnarenko, O., Oehl, F.: Improvements on the Genet and Klay Technique to Automatically Verify Security Protocols. In: Proc. of Automated Verification of Infinite States Systems (AVIS 2004). ENTCS, pp. 1\u201311 (2004)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory\u00a02(29) (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Rusinowitch, M., Turuani, M.: Protocol Insecurity with Finite Number of Sessions is NP-complete. In: 14th IEEE Computer Security Foundations Workshop, pp. 174\u2013187. IEEE Computer Society (2001)","DOI":"10.1109\/CSFW.2001.930145"},{"issue":"6","key":"20_CR15","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Lowe, G.: A Hierarchy of Authentication Specifications. In: Proceedings of the 10th IEEE Computer Security Foundations Workshop (CSFW 1997), pp. 31\u201343. IEEE Computer Society Press (1997)","DOI":"10.1109\/CSFW.1997.596782"},{"issue":"3","key":"20_CR17","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1145\/177492.177726","volume":"16","author":"L. Lamport","year":"1994","unstructured":"Lamport, L.: The temporal logic of actions. ACM Transactions on Programming Languages and Systems\u00a016(3), 872\u2013923 (1994)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Javed. A. HLPSL Models of CWA 14890-1 Protocols, http:\/\/ashar-javed.blogspot.com\/2011\/05\/formal-analysis-of-cwa-14890-1-protocol.html","DOI":"10.1007\/978-3-642-27257-8_20"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27257-8_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:59:18Z","timestamp":1606168758000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27257-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272561","9783642272578"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27257-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}