{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T05:10:07Z","timestamp":1746162607488,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_51","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T06:15:38Z","timestamp":1395728138000},"page":"500-510","source":"Crossref","is-referenced-by-count":5,"title":["Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol"],"prefix":"10.1007","author":[{"given":"Rima","family":"Addas","sequence":"first","affiliation":[]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"51_CR1","doi-asserted-by":"crossref","unstructured":"Alvarez, R.C.: The promise of e-health - A canadian perspective. Ehealth International 1(1) (September 2002)","DOI":"10.1186\/1476-3591-1-4"},{"key":"51_CR2","unstructured":"Pang, C., Hansen, D.: Improved record linkage for encrypted identifying data, Sydney, Austrailia, pp. 164\u2013168 (2006)"},{"key":"51_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-642-25364-5_38","volume-title":"Information Quality in e-Health","author":"R. Addas","year":"2011","unstructured":"Addas, R., Zhang, N.: An enhanced approach to supporting controlled access to eprs with three levels of identity privacy preservations. In: Holzinger, A., Simonic, K.-M. (eds.) USAB 2011. LNCS, vol.\u00a07058, pp. 547\u2013561. Springer, Heidelberg (2011)"},{"issue":"12","key":"51_CR4","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"issue":"3","key":"51_CR5","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G. Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters\u00a056(3), 131\u2013133 (1995)","journal-title":"Information Processing Letters"},{"key":"51_CR6","doi-asserted-by":"crossref","unstructured":"Kim, I.G., Choi, J.Y.: Formal verification of pap and eap-md5 protocols in wireless networks: Fdr model checking. In: 18th International Conference on Advanced Information Networking and Applications, AINA 2004, vol.\u00a02, pp. 264\u2013269 (2004)","DOI":"10.1109\/AINA.2004.1283800"},{"key":"51_CR7","doi-asserted-by":"crossref","unstructured":"Lowe, G.: Casper: A compiler for the analysis of security protocols, pp. 18\u201330 (June 1997)","DOI":"10.1109\/CSFW.1997.596779"},{"key":"51_CR8","unstructured":"Formal System (Europe) LTD.: Failure-divergences refinement fdr2 manual (2010)"},{"key":"51_CR9","unstructured":"Kim, I.G., Kim, H.S., Lee, J.Y., Choi, J.Y.: Analysis and modification of ask mobile security protocol. In: The Second IEEE International Workshop on Mobile Commerce and Services, WMCS 2005, pp. 79\u201383 (2005)"},{"key":"51_CR10","doi-asserted-by":"crossref","unstructured":"Kim, H.S., Oh, J.H., Choi, J.Y., Kim, J.W.: The vulnerabilities analysis and design of the security protocol for rfid system. In: The Sixth IEEE International Conference on Computer and Information Technology, CIT 2006, p. 152 (2006)","DOI":"10.1109\/CIT.2006.180"},{"key":"51_CR11","unstructured":"Chan, P., Lee, R., Kramer, D.: The Java Class Libraries, Volume 1: Supplement for the Java 2 Platform, Standard Edition, V 1.2., vol.\u00a01. Addison-Wesley Professional (1999)"},{"key":"51_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-24654-1_13","volume-title":"Selected Areas in Cryptography","author":"H. Gilbert","year":"2004","unstructured":"Gilbert, H., Handschuh, H.: Security Analysis of SHA-256 and Sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 175\u2013193. Springer, Heidelberg (2004)"},{"key":"51_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-45126-6_12","volume-title":"Financial Cryptography","author":"J. Bl\u00f6mer","year":"2003","unstructured":"Bl\u00f6mer, J., Seifert, J.-P.: Fault based cryptanalysis of the advanced encryption standard (aes). In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 162\u2013181. Springer, Heidelberg (2003)"},{"key":"51_CR14","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM\u00a021, 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"51_CR15","unstructured":"Wagner, D., Schneier, B.: Analysis of the ssl 3.0 protocol. In: Proceedings of the Second Unix Workshop on Electronic Commerce, pp. 29\u201340. USENIX Association (1996)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:29:23Z","timestamp":1746160163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}