{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:11:02Z","timestamp":1746115862260,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642384561"},{"type":"electronic","value":"9783642384578"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38457-8_24","type":"book-chapter","created":{"date-parts":[[2013,5,7]],"date-time":"2013-05-07T00:57:34Z","timestamp":1367888254000},"page":"256-262","source":"Crossref","is-referenced-by-count":0,"title":["Revisiting the Epistemics of Protocol Correctness"],"prefix":"10.1007","author":[{"given":"Aaron","family":"Hunter","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-45941-3_3","volume-title":"From Theory to Practice in Multi-Agent Systems","author":"N. Agray","year":"2002","unstructured":"Agray, N., van der Hoek, W., de Vink, E.: On BAN logics for industrial security protocols. In: Dunin-Keplicz, B., Nawarecki, E. (eds.) CEEMAS 2001. LNCS (LNAI), vol.\u00a02296, pp. 29\u201336. Springer, Heidelberg (2002)"},{"issue":"1","key":"24_CR2","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"issue":"4","key":"24_CR3","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1145\/383779.383785","volume":"2","author":"L. Carlucci Aiello","year":"2001","unstructured":"Carlucci Aiello, L., Massacci, F.: Verifying Security Protocols as Planning in Logic Programming. ACM Transactions on Computational Logic\u00a02(4), 542\u2013580 (2001)","journal-title":"ACM Transactions on Computational Logic"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","volume-title":"Computer Aided Verification","author":"C.J.F. Cremers","year":"2008","unstructured":"Cremers, C.J.F.: The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.\u00a05123, pp. 414\u2013418. Springer, Heidelberg (2008)"},{"key":"24_CR5","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-540-75560-9_18","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"F. Dechesne","year":"2007","unstructured":"Dechesne, F., Mousavi, M.R., Orzan, S.: Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap. In: Dershowitz, N., Voronkov, A. (eds.) LPAR 2007. LNCS (LNAI), vol.\u00a04790, pp. 226\u2013241. Springer, Heidelberg (2007)"},{"issue":"29","key":"24_CR6","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"2","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. IEEE Transactions on Information Theory\u00a02(29), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Fagin, R., Halpern, J., Moses, Y., Vardi, M.: Reasoning About Knowledge. MIT Press (1995)","DOI":"10.7551\/mitpress\/5803.001.0001"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., Yahalom, R.: Reasoning About Belief in Cryptographic Protocols. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234\u2013248 (1990)","DOI":"10.1109\/RISP.1990.63854"},{"key":"24_CR9","unstructured":"Guttman, J., Thayer, J.: Authentication tests. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy (2000)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Halpern, J., Pucella, R.: On the relationship between strand spaces and multi-agent systems. ACM Transactions on Information and System Security (TISSEC)\u00a06(1) (2003)","DOI":"10.1145\/605434.605436"},{"key":"24_CR11","unstructured":"Hunter, A., Delgrande, J.P.: Belief Change and Cryptographic Protocol Verification. In: Proceedings of the National Conference on Artificial Intelligence, AAAI 2007 (2007)"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-540-89900-6_9","volume-title":"Intelligence and Security Informatics","author":"A. Hunter","year":"2008","unstructured":"Hunter, A.: Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary. In: Ortiz-Arroyo, D., Larsen, H.L., Zeng, D.D., Hicks, D., Wagner, G. (eds.) EuroISI 2008. LNCS, vol.\u00a05376, pp. 61\u201372. Springer, Heidelberg (2008)"},{"key":"24_CR13","unstructured":"Kramer, S.: Reducing Provability to Knowledge in Multi-Agent Systems. In: Intuitionistic Modal Logics and Applications Workshop, IMLA 2008 (2008)"},{"key":"24_CR14","doi-asserted-by":"crossref","first-page":"317","DOI":"10.3233\/JCS-1992-13-407","volume":"1","author":"P. Syverson","year":"1992","unstructured":"Syverson, P.: Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols. Journal of Compuer Security\u00a01, 317\u2013334 (1992)","journal-title":"Journal of Compuer Security"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/3-540-45608-2_2","volume-title":"Foundations of Security Analysis and Design","author":"P. Syverson","year":"2001","unstructured":"Syverson, P., Cervesato, I.: The logic of authentication protocols. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 63\u2013137. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38457-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T08:48:34Z","timestamp":1746002914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38457-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642384561","9783642384578"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38457-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}