{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T21:40:04Z","timestamp":1745185204669,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642351785"},{"type":"electronic","value":"9783642351792"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35179-2_11","type":"book-chapter","created":{"date-parts":[[2012,11,14]],"date-time":"2012-11-14T02:20:42Z","timestamp":1352859642000},"page":"251-276","source":"Crossref","is-referenced-by-count":4,"title":["Privacy Compliance Verification in Cryptographic Protocols"],"prefix":"10.1007","author":[{"given":"Suriadi","family":"Suriadi","sequence":"first","affiliation":[]},{"given":"Chun","family":"Ouyang","sequence":"additional","affiliation":[]},{"given":"Ernest","family":"Foo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"van der Aalst, W.: Pi calculus versus Petri nets: Let us eat humble pie rather than further inflate the Pi hype. BPTrends, 1\u201311 (May 2005)"},{"issue":"3","key":"11_CR2","first-page":"201","volume":"12","author":"I. Al-Azzoni","year":"2005","unstructured":"Al-Azzoni, I., Down, D.G., Khedri, R.: Modeling and verification of cryptographic protocols using Coloured Petri nets and Design\/CPN. Nordic Journal of Computing\u00a012(3), 201\u2013228 (2005)","journal-title":"Nordic Journal of Computing"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Backes, M., Maffei, M., Unruh, D.: Zero-knowledge in the applied Pi-calculus and automated verification of the direct anonymous attestation protocol. In: IEEE Symposium on Security and Privacy, pp. 202\u2013215 (May 2008)","DOI":"10.1109\/SP.2008.23"},{"issue":"2-3","key":"11_CR4","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.tcs.2004.07.036","volume":"335","author":"J.C.M. Baeten","year":"2005","unstructured":"Baeten, J.C.M.: A brief history of process algebra. Theor. Comput. Sci.\u00a0335(2-3), 131\u2013146 (2005)","journal-title":"Theor. Comput. Sci."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"issue":"3-4","key":"11_CR6","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10009-007-0034-1","volume":"9","author":"J. Billington","year":"2007","unstructured":"Billington, J., Han, B.: Modelling and analysing the functional behaviour of TCP\u2019s connection management procedures. STTT\u00a09(3-4), 269\u2013304 (2007)","journal-title":"STTT"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: 14th IEEE CSFW, pp. 82\u201396. IEEE Computer Society (2001)","DOI":"10.1109\/CSFW.2001.930138"},{"issue":"3","key":"11_CR8","doi-asserted-by":"crossref","first-page":"347","DOI":"10.3233\/JCS-2005-13302","volume":"13","author":"C. Bodei","year":"2005","unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. J. Comput. Secur.\u00a013(3), 347\u2013390 (2005)","journal-title":"J. Comput. Secur."},{"key":"11_CR9","unstructured":"Christensen, S., Mortensen, K.H.: Design\/CPN ASK-CTL Manual - Version 0.9. University of Aarhus, Aarhus C, Denmark (1996)"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","volume-title":"Computer Aided Verification","author":"C.J.F. Cremers","year":"2008","unstructured":"Cremers, C.J.F.: The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.\u00a05123, pp. 414\u2013418. Springer, Heidelberg (2008)"},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.C.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013207 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR12","unstructured":"Gilmore, S.: Programming in standard ML \u201997: A tutorial introduction. Tech. rep., The University of Edinburgh (1997)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Jensen, K., Kristensen, L.M.: Coloured Petri Nets - Modelling and Validation of Concurrent Systems. Springer (2009)","DOI":"10.1007\/b95112"},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00145-005-0432-z","volume":"20","author":"N. Koblitz","year":"2007","unstructured":"Koblitz, N., Menezes, A.: Another look at \u201dprovable security\u201d. J. Cryptology\u00a020(1), 3\u201337 (2007)","journal-title":"J. Cryptology"},{"key":"11_CR15","unstructured":"Milner, R.: Communicating and Mobile Systems: the Pi-Calculus. Cambridge University Press (June 1999)"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-16280-0_4","volume-title":"Provable Security","author":"L. Ngo","year":"2010","unstructured":"Ngo, L., Boyd, C., Nieto, J.G.: Automating Computational Proofs for Public-Key-Based Key Exchange. In: Heng, S.-H., Kurosawa, K. (eds.) ProvSec 2010. LNCS, vol.\u00a06402, pp. 53\u201369. Springer, Heidelberg (2010)"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Pointcheval, D.: Contemporary cryptology - Provable security for public key schemes. Advanced Courses in Mathematics, pp. 133\u2013189. Birkh\u00e4user (2005)","DOI":"10.1007\/3-7643-7394-6_4"},{"key":"11_CR18","unstructured":"Suriadi, S.: Strengthening and Formally Verifying Privacy in Identity Management Systems. Ph.D. thesis, Queensland University of Technology (September 2010)"},{"issue":"2","key":"11_CR19","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.jnca.2008.02.016","volume":"32","author":"S. Suriadi","year":"2009","unstructured":"Suriadi, S., Foo, E., Josang, A.: A user-centric federated single sign-on system. Journal of Network and Computer Applications\u00a032(2), 388\u2013401 (2009)","journal-title":"Journal of Network and Computer Applications"},{"key":"11_CR20","unstructured":"Suriadi, S., Foo, E., Smith, J.: Private information escrow bound to multiple conditions. Tech. rep., Information Security Institute - Queensland University of Technology (2008), http:\/\/eprints.qut.edu.au\/17763\/1\/c17763.pdf"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Suriadi, S., Ouyang, C., Foo, E.: Privacy compliance verification in cryptographic protocols. Tech. Rep. 48484, Queensland University of Technology, Brisbane, Australia (2012), http:\/\/eprints.qut.edu.au\/48484\/","DOI":"10.1007\/978-3-642-35179-2_11"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-642-10373-5_7","volume-title":"Formal Methods and Software Engineering","author":"S. Suriadi","year":"2009","unstructured":"Suriadi, S., Ouyang, C., Smith, J., Foo, E.: Modeling and Verification of Privacy Enhancing Protocols. In: Breitman, K., Cavalcanti, A. (eds.) ICFEM 2009. LNCS, vol.\u00a05885, pp. 127\u2013146. Springer, Heidelberg (2009)"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/0-387-34805-0_30","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"M. Tatebayashi","year":"1990","unstructured":"Tatebayashi, M., Matsuzaki, N., Newman Jr., D.B.: Key Distribution Protocol for Digital Mobile Communication Systems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 324\u2013334. Springer, Heidelberg (1990)"},{"key":"11_CR24","unstructured":"WP 14.1: PRIME (Privacy and Identity Management for Europe) - Framework V3 (March 2008)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Petri Nets and Other Models of Concurrency VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35179-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T21:03:31Z","timestamp":1745183011000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35179-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642351785","9783642351792"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35179-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}