{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:47:28Z","timestamp":1725893248757},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642294198"},{"type":"electronic","value":"9783642294204"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29420-4_11","type":"book-chapter","created":{"date-parts":[[2012,6,25]],"date-time":"2012-06-25T09:12:33Z","timestamp":1340615553000},"page":"164-181","source":"Crossref","is-referenced-by-count":2,"title":["Analysing Applications Layered on Unilaterally Authenticating Protocols"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Gibson-Robinson","sequence":"first","affiliation":[]},{"given":"Gavin","family":"Lowe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Dierks, T., Rescorla, E.: The TLS Protocol: Version 1.2 (2008), \n                  \n                    http:\/\/tools.ietf.org\/html\/rfc5246"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Bella, G., Longo, C., Paulson, L.: Verifying Second-Level Security Protocols. In: Theorem Proving in Higher Order Logics (2003)","DOI":"10.1007\/10930755_23"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Dilloway, C., Lowe, G.: Specifying Secure Transport Channels. In: Computer Security Foundations Symposium (2008)","DOI":"10.1109\/CSF.2008.14"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Armando, A., Carbone, R., Compagna, L.: LTL Model Checking for Security Protocols. In: Computer Security Foundations Symposium (2007)","DOI":"10.1109\/CSF.2007.24"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Armando, A., Carbone, R., Compagna, L., Cuellar, J., Tobarra, L.: Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. In: Formal Methods in Security Engineering (2008)","DOI":"10.1145\/1456396.1456397"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Bugliesi, M., Focardi, R.: Language Based Secure Communication. In: Computer Security Foundations Symposium (2008)","DOI":"10.1109\/CSF.2008.17"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-04444-1_21","volume-title":"Computer Security \u2013 ESORICS 2009","author":"S. M\u00f6dersheim","year":"2009","unstructured":"M\u00f6dersheim, S., Vigan\u00f2, L.: Secure Pseudonymous Channels. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 337\u2013354. Springer, Heidelberg (2009)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-12459-4_17","volume-title":"Formal Aspects in Security and Trust","author":"A. Kamil","year":"2010","unstructured":"Kamil, A., Lowe, G.: Specifying and Modelling Secure Channels in Strand Spaces. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol.\u00a05983, pp. 233\u2013247. Springer, Heidelberg (2010)"},{"key":"11_CR9","unstructured":"Kamil, A.: The Modelling and Analysis of Layered Security Architectures in Strand Spaces. DPhil Thesis. University of Oxford (2010)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Thayer F\u00e1brega, F.J., Herzog, J., Guttman, J.: Strand spaces: Proving Security Protocols Correct. Journal of Computer Security (1999)","DOI":"10.21236\/ADA459060"},{"key":"11_CR11","unstructured":"Schemers, R., Allbery, R.: WebAuth Technical Specification v.3 (2009), \n                  \n                    http:\/\/webauth.stanford.edu\/protocol"},{"key":"11_CR12","unstructured":"Fitzpatrick, B., Recordon, D., Hardt, D., Bufu, J., Hoyt, J.: OpenID Authentication 2.0, \n                  \n                    http:\/\/openid.net\/specs\/openid-authentication-2_0.html"},{"key":"11_CR13","unstructured":"Leach, P.J., Berners-Lee, T., Mogul, J.C., Masinter, L., Fielding, R.T., Gettys, J.: Hypertext Transfer Protocol \u2013 HTTP\/1.1 (2004), \n                  \n                    http:\/\/tools.ietf.org\/html\/rfc2616"},{"key":"11_CR14","unstructured":"Rescorla, E.: HTTP Over TLS (2000), \n                  \n                    http:\/\/tools.ietf.org\/html\/rfc2818"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Guttman, J.D., Thayer, F.J.: Authentication tests and the structure of bundles. Theoretical Computer Science (2002)","DOI":"10.1016\/S0304-3975(01)00139-6"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Gro\u00df, T., M\u00f6dersheim, S.: Vertical Protocol Composition. In: Computer Security Foundations Symposium (2011)","DOI":"10.1109\/CSF.2011.23"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Kamil, A., Lowe, G.: Analysing TLS in the Strand Spaces Model. To appear in Journal of Computer Security (2011)","DOI":"10.3233\/JCS-2011-0429"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-19751-2_4","volume-title":"Formal Aspects of Security and Trust","author":"A. Kamil","year":"2011","unstructured":"Kamil, A., Lowe, G.: Understanding Abstractions of Secure Channels. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol.\u00a06561, pp. 50\u201364. Springer, Heidelberg (2011)"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-71209-1_41","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S. Doghmi","year":"2007","unstructured":"Doghmi, S., Guttman, J., Thayer, F.J.: Searching for Shapes in Cryptographic Protocols. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol.\u00a04424, pp. 523\u2013537. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29420-4_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:00:53Z","timestamp":1620111653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29420-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642294198","9783642294204"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29420-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}