{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:02:11Z","timestamp":1761807731642,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642280726"},{"type":"electronic","value":"9783642280733"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28073-3_2","type":"book-chapter","created":{"date-parts":[[2012,2,21]],"date-time":"2012-02-21T06:11:19Z","timestamp":1329804679000},"page":"7-26","source":"Crossref","is-referenced-by-count":14,"title":["Actor-Network Procedures"],"prefix":"10.1007","author":[{"given":"Dusko","family":"Pavlovic","sequence":"first","affiliation":[]},{"given":"Catherine","family":"Meadows","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"2_CR1","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s00145-001-0014-7","volume":"15","author":"M. Abadi","year":"2002","unstructured":"Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). J. of Cryptology\u00a015(2), 103\u2013127 (2002)","journal-title":"J. of Cryptology"},{"key":"2_CR2","unstructured":"Anlauff, M., Pavlovic, D., Waldinger, R., Westfold, S.: Proving authentication properties in the Protocol Derivation Assistant. In: Proc. FCS-ARSPA 2006. ACM (2006)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Barthe, G., Hedin, D.L., B\u00e9guelin, S.Z., Gr\u00e9goire, B., Heraud, S.: A machine-checked formalization of sigma-protocols. In: Proc. CSF 2010, pp. 246\u2013260. IEEE Computer Society (2010)","DOI":"10.1109\/CSF.2010.24"},{"key":"2_CR4","volume-title":"Handbook of Model Checking","author":"D. Basin","year":"2011","unstructured":"Basin, D., Cremers, C., Meadows, C.: Model checking security protocols. In: Clarke, E., Henzinger, T., Veith, H. (eds.) Handbook of Model Checking. Springer, Heidelberg (to appear, 2011), http:\/\/people.inf.ethz.ch\/cremersc\/publications\/index.html"},{"issue":"4","key":"2_CR5","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/TDSC.2007.1005","volume":"5","author":"B. Blanchet","year":"2008","unstructured":"Blanchet, B.: A computationally sound mechanized prover for security protocols. IEEE Trans. Dependable Sec. Comput.\u00a05(4), 193\u2013207 (2008)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/11861386_12","volume-title":"Security Protocols","author":"M. Blaze","year":"2006","unstructured":"Blaze, M.: Toward a Broader View of Security Protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol.\u00a03957, pp. 106\u2013120. Springer, Heidelberg (2006)"},{"issue":"1","key":"2_CR7","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M.L. Burrows","year":"1990","unstructured":"Burrows, M.L., Abadi, M., Needham, R.: A Logic of Authentication. ACM Trans. Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Trans. Computer Systems"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Cervesato, I., Meadows, C., Pavlovic, D.: An encapsulated authentication logic for reasoning about key distribution protocols. In: Proc. CSFW 2005, pp. 48\u201361. IEEE (2005)","DOI":"10.1109\/CSFW.2005.7"},{"issue":"3-4","key":"2_CR9","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s10817-010-9187-9","volume":"46","author":"V. Cortier","year":"2011","unstructured":"Cortier, V., Kremer, S., Warinschi, B.: A survey of symbolic methods in computational analysis of cryptographic systems. J. Autom. Reasoning\u00a046(3-4), 225\u2013259 (2011)","journal-title":"J. Autom. Reasoning"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Datta, A., Derek, A., Mitchell, J., Pavlovic, D.: Secure protocol composition. E. Notes in Theor. Comp. Sci., 87\u2013114 (2003)","DOI":"10.1145\/1035429.1035431"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"423","DOI":"10.3233\/JCS-2005-13304","volume":"13","author":"A. Datta","year":"2005","unstructured":"Datta, A., Derek, A., Mitchell, J., Pavlovic, D.: A derivation system and compositional logic for security protocols. J. of Comp. Security\u00a013, 423\u2013482 (2005)","journal-title":"J. of Comp. Security"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system for security protocols and its logical formalization. In: Proc. of CSFW 2003, pp. 109\u2013125. IEEE (2003)","DOI":"10.1109\/CSFW.2003.1212708"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-71209-1_41","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S.F. Doghmi","year":"2007","unstructured":"Doghmi, S.F., Guttman, J.D., Thayer, F.J.: Searching for Shapes in Cryptographic Protocols. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol.\u00a04424, pp. 523\u2013537. Springer, Heidelberg (2007)"},{"issue":"2","key":"2_CR14","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR15","unstructured":"Dorogovtsev, S.N., Mendes, J.F.F.: Evolution of Networks: From Biological Nets to the Internet and WWW. Oxford University Press (2003)"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-03549-4_11","volume-title":"Financial Cryptography and Data Security","author":"S. Drimer","year":"2009","unstructured":"Drimer, S., Murdoch, S.J., Anderson, R.: Optimised to Fail: Card Readers for Online Banking. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 184\u2013200. Springer, Heidelberg (2009)"},{"issue":"4","key":"2_CR17","doi-asserted-by":"publisher","first-page":"677","DOI":"10.3233\/JCS-2003-11407","volume":"11","author":"N. Durgin","year":"2004","unstructured":"Durgin, N., Mitchell, J., Pavlovic, D.: A compositional logic for proving security properties of protocols. J. of Comp. Security\u00a011(4), 677\u2013721 (2004)","journal-title":"J. of Comp. Security"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Durgin, N., Mitchell, J.C., Pavlovic, D.: A compositional logic for protocol correctness. In: Proc. of CSFW 2001, pp. 241\u2013255. IEEE (2001)","DOI":"10.1109\/CSFW.2001.930150"},{"key":"2_CR19","unstructured":"Ellison, C.: Ceremony design and analysis. Cryptology ePrint Archive, Report 2007\/399 (October 2007)"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"J. Thayer Fabrega","year":"1999","unstructured":"Thayer Fabrega, J., Herzog, J., Guttman, J.: Strand spaces: What makes a security protocol correct? Journal of Computer Security\u00a07, 191\u2013230 (1999)","journal-title":"Journal of Computer Security"},{"key":"2_CR21","volume-title":"Universal Algebra","author":"G.A. Gratzer","year":"1968","unstructured":"Gratzer, G.A.: Universal Algebra. Van Nostrand, Princeton (1968)"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-540-32004-3_12","volume-title":"Security in Pervasive Computing","author":"J.-H. Hoepman","year":"2005","unstructured":"Hoepman, J.-H.: Ephemeral Pairing on Anonymous Networks. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol.\u00a03450, pp. 101\u2013116. Springer, Heidelberg (2005)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Karlof, C.S., Tygar, J.D., Wagner, D.: Conditioned-safe ceremonies and a user study of an application to web authentication. In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, p. 38:1 ACM (2009)","DOI":"10.1145\/1572532.1572578"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1016\/j.pmcj.2009.07.008","volume":"5","author":"A. Kumar","year":"2009","unstructured":"Kumar, A., Saxena, N., Tsudik, G., Uzun, E.: A comparative study of secure device pairing methods. Pervasive Mob. Comput.\u00a05, 734\u2013749 (2009)","journal-title":"Pervasive Mob. Comput."},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Latour, B.: Reassembling the Social: An Introduction to Actor-Network Theory. Oxford University Press (2005)","DOI":"10.1093\/oso\/9780199256044.001.0001"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/11935070_6","volume-title":"Cryptology and Network Security","author":"S. Laur","year":"2006","unstructured":"Laur, S., Nyberg, K.: Efficient Mutual Data Authentication Using Manually Authenticated Strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol.\u00a04301, pp. 90\u2013107. Springer, Heidelberg (2006)"},{"issue":"1\/2","key":"2_CR27","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1504\/IJSN.2009.023427","volume":"4","author":"S. Laur","year":"2009","unstructured":"Laur, S., Pasini, S.: User-aided data authentication. IJSN\u00a04(1\/2), 69\u201386 (2009)","journal-title":"IJSN"},{"key":"2_CR28","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-9839-7","volume-title":"Categories for the Working Mathematician","author":"S. Mac Lane","year":"1971","unstructured":"Mac Lane, S.: Categories for the Working Mathematician. Graduate Texts in Mathematics, vol.\u00a05. Springer, Heidelberg (1971)"},{"key":"2_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-540-30108-0_4","volume-title":"Computer Security \u2013 ESORICS 2004","author":"C. Meadows","year":"2004","unstructured":"Meadows, C., Pavlovic, D.: Deriving, Attacking and Defending the GDOI Protocol. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 53\u201372. Springer, Heidelberg (2004)"},{"key":"2_CR30","volume-title":"Secure Localization and Time Synchronization in Wireless Ad Hoc and Sensor Networks","author":"C. Meadows","year":"2006","unstructured":"Meadows, C., Poovendran, R., Pavlovic, D., Chang, L., Syverson, P.: Distance bounding protocols: authentication logic analysis and collusion attacks. In: Poovendran, R., Wang, C., Roy, S. (eds.) Secure Localization and Time Synchronization in Wireless Ad Hoc and Sensor Networks. Springer, Heidelberg (2006)"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Newman, M.: Networks: An Introduction. Oxford University Press (2010)","DOI":"10.1093\/acprof:oso\/9780199206650.003.0001"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Nguyen, L.H., Roscoe, A.W.: Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey. Journal of Computer Security (to appear, 2011)","DOI":"10.3233\/JCS-2010-0403"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Palsson, B.O.: Systems Biology: Properties of Reconstructed Networks. Cambridge University Press (2006)","DOI":"10.1017\/CBO9780511790515"},{"key":"2_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/11745853_26","volume-title":"Public Key Cryptography - PKC 2006","author":"S. Pasini","year":"2006","unstructured":"Pasini, S., Vaudenay, S.: SAS-Based Authenticated Key Agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 395\u2013409. Springer, Heidelberg (2006)"},{"issue":"2","key":"2_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/jigpal\/4.2.159","volume":"4","author":"D. Pavlovic","year":"1996","unstructured":"Pavlovic, D.: Maps II: Chasing diagrams in categorical proof theory. J. of the IGPL\u00a04(2), 1\u201336 (1996)","journal-title":"J. of the IGPL"},{"key":"2_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/11863908_24","volume-title":"Computer Security \u2013 ESORICS 2006","author":"D. Pavlovic","year":"2006","unstructured":"Pavlovic, D., Meadows, C.: Deriving Secrecy in Key Establishment Protocols. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 384\u2013403. Springer, Heidelberg (2006)"},{"key":"2_CR37","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.entcs.2010.08.007","volume":"265","author":"D. Pavlovic","year":"2010","unstructured":"Pavlovic, D., Meadows, C.: Bayesian authentication: Quantifying security of the Hancke-Kuhn protocol. E. Notes in Theor. Comp. Sci.\u00a0265, 97\u2013122 (2010)","journal-title":"E. Notes in Theor. Comp. Sci."},{"key":"2_CR38","volume-title":"Proceedings of the Cambridge Workshop on Security Protocols 2009","author":"D. Pavlovic","year":"2010","unstructured":"Pavlovic, D., Meadows, C.: Deriving ephemeral authentication using channel axioms. In: Proceedings of the Cambridge Workshop on Security Protocols 2009. Springer, Heidelberg (2010) (to appear)"},{"key":"2_CR39","unstructured":"Pavlovic, D., Smith, D.R.: Composition and refinement of behavioral specifications. In: Proc. Automated Software Engineering 2001. IEEE (2001)"},{"key":"2_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/3-540-45719-4_28","volume-title":"Algebraic Methodology and Software Technology","author":"D. Pavlovic","year":"2002","unstructured":"Pavlovic, D., Smith, D.R.: Guarded Transitions in Evolving Specifications. In: Kirchner, H., Ringeissen, C. (eds.) AMAST 2002. LNCS, vol.\u00a02422, pp. 411\u2013425. Springer, Heidelberg (2002)"},{"key":"2_CR41","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MC.2003.1236471","volume":"36","author":"C. Peltz","year":"2003","unstructured":"Peltz, C.: Web services orchestration and choreography. Computer\u00a036, 46\u201352 (2003)","journal-title":"Computer"},{"issue":"1","key":"2_CR42","first-page":"75","volume":"2","author":"W. Pieters","year":"2011","unstructured":"Pieters, W.: Representing humans in system security models: An actor-network approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\u00a02(1), 75\u201392 (2011)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"2_CR43","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/BF01379149","volume":"15","author":"V. Pratt","year":"1987","unstructured":"Pratt, V.: Modelling concurrency with partial orders. Internat. J. Parallel Programming\u00a015, 33\u201371 (1987)","journal-title":"Internat. J. Parallel Programming"},{"key":"2_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/978-3-642-14577-3_4","volume-title":"Financial Cryptography and Data Security","author":"F. Stajano","year":"2010","unstructured":"Stajano, F., Wong, F.-L., Christianson, B.: Multichannel Protocols to Prevent Relay Attacks. In: Sion, R. (ed.) FC 2010. LNCS, vol.\u00a06052, pp. 4\u201319. Springer, Heidelberg (2010)"},{"key":"2_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/11535218_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"S. Vaudenay","year":"2005","unstructured":"Vaudenay, S.: Secure Communications over Insecure Channels Based on Short Authenticated Strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 309\u2013326. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28073-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T10:20:29Z","timestamp":1742552429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28073-3_2"}},"subtitle":["(Extended Abstract)"],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642280726","9783642280733"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28073-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}