{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T15:40:07Z","timestamp":1743608407495,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642294198"},{"type":"electronic","value":"9783642294204"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29420-4_15","type":"book-chapter","created":{"date-parts":[[2012,6,25]],"date-time":"2012-06-25T13:12:33Z","timestamp":1340629953000},"page":"230-244","source":"Crossref","is-referenced-by-count":1,"title":["Is Cryptyc Able to Detect Insider Attacks?"],"prefix":"10.1007","author":[{"given":"Behnam","family":"Sattarzadeh","sequence":"first","affiliation":[]},{"given":"Mehran S.","family":"Fallah","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"15_CR1","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1145\/324133.324266","volume":"46","author":"M. Abadi","year":"1999","unstructured":"Abadi, M.: Secrecy by typing in security protocols. Journal of the ACM (JACM)\u00a046(5), 749\u2013786 (1999)","journal-title":"Journal of the ACM (JACM)"},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: the spi calculus. Information and Computation\u00a0148(1), 1\u201370 (1999)","journal-title":"Information and Computation"},{"issue":"2","key":"15_CR3","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"unstructured":"Focardi, R., Maffei, M.: Types for security protocols. In: Cortier, V., Kremer, S. (eds.) Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security Series, vol.\u00a05, ch. 7, pp. 143\u2013181. IOS Press (2011)","key":"15_CR4"},{"unstructured":"Gordon, A.D., Haack, C., Jeffrey, A.: Cryptyc: Cryptographic protocol type checker, http:\/\/www.cryptyc.org\/","key":"15_CR5"},{"issue":"4","key":"15_CR6","doi-asserted-by":"crossref","first-page":"451","DOI":"10.3233\/JCS-2003-11402","volume":"11","author":"A.D. Gordon","year":"2003","unstructured":"Gordon, A.D., Jeffrey, A.: Authenticity by typing for security protocols. Journal of Computer Security\u00a011(4), 451\u2013519 (2003)","journal-title":"Journal of Computer Security"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/3-540-36532-X_17","volume-title":"Software Security \u2013 Theories and Systems","author":"A.D. Gordon","year":"2003","unstructured":"Gordon, A.D., Jeffrey, A.: Typing One-to-One and One-to-Many Correspondences in Security Protocols. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 263\u2013282. Springer, Heidelberg (2003)"},{"issue":"3","key":"15_CR8","doi-asserted-by":"crossref","first-page":"435","DOI":"10.3233\/JCS-2004-123-406","volume":"12","author":"A.D. Gordon","year":"2004","unstructured":"Gordon, A.D., Jeffrey, A.: Types and effects for asymmetric cryptographic protocols. Journal of Computer Security\u00a012(3), 435\u2013483 (2004)","journal-title":"Journal of Computer Security"},{"issue":"8","key":"15_CR9","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1016\/j.ic.2006.04.004","volume":"204","author":"C. Haack","year":"2006","unstructured":"Haack, C., Jeffrey, A.: Pattern-matching spi-calculus. Information and Computation\u00a0204(8), 1195\u20131263 (2006)","journal-title":"Information and Computation"},{"issue":"2","key":"15_CR10","doi-asserted-by":"crossref","first-page":"217","DOI":"10.3233\/JCS-2003-11204","volume":"11","author":"J. Heather","year":"2003","unstructured":"Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols. Journal of Computer Security\u00a011(2), 217\u2013244 (2003)","journal-title":"Journal of Computer Security"},{"issue":"3","key":"15_CR11","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G. Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters\u00a056(3), 131\u2013133 (1995)","journal-title":"Information Processing Letters"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"doi-asserted-by":"crossref","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: Proceedings of the 10th IEEE Computer Security Foundations Workshop (CSFW 1997), pp. 31\u201343. IEEE Computer Society (1997)","key":"15_CR13","DOI":"10.1109\/CSFW.1997.596782"},{"issue":"12","key":"15_CR14","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Communications of the ACM"},{"unstructured":"Sattarzadeh, B., Fallah, M.S.: Cryptyc\u2009+\u2009, http:\/\/ceit.aut.ac.ir\/formalsecurity\/tasp\/","key":"15_CR15"},{"doi-asserted-by":"crossref","unstructured":"Woo, T.Y.C., Lam, S.S.: A semantic model for authentication protocols. In: Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 178\u2013194. IEEE Computer Society (1993)","key":"15_CR16","DOI":"10.1109\/RISP.1993.287633"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29420-4_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T14:59:28Z","timestamp":1743605968000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29420-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642294198","9783642294204"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29420-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}