{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:21:58Z","timestamp":1725888118885},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811050404"},{"type":"electronic","value":"9789811050411"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5041-1_87","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T03:14:39Z","timestamp":1494645279000},"page":"545-550","source":"Crossref","is-referenced-by-count":0,"title":["A Supporting Environment for Formal Analysis of Cryptographic Protocols"],"prefix":"10.1007","author":[{"given":"Jingchen","family":"Yan","sequence":"first","affiliation":[]},{"given":"Kazunori","family":"Wagatsuma","sequence":"additional","affiliation":[]},{"given":"Hongbiao","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jingde","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"issue":"1","key":"87_CR1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s00165-012-0269-9","volume":"26","author":"M Avalle","year":"2014","unstructured":"Avalle, M., Alfredo, P., Riccardo, S.: Formal verification of security protocol implementations: a survey. Formal Aspects Comput. 26(1), 99 (2014)","journal-title":"Formal Aspects Comput."},{"issue":"3","key":"87_CR2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MSP.2011.2","volume":"9","author":"J Bau","year":"2011","unstructured":"Bau, J., Mitchell, J.C.: Security modeling and analysis. IEEE Secur. Priv. 9(3), 18\u201325 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"87_CR3","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp. 82\u201396. IEEE, (2001)","DOI":"10.1109\/CSFW.2001.930138"},{"key":"87_CR4","unstructured":"Blanchet, B., Smyth, B., Cheval, V.: ProVerif 1.96: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial (2016)"},{"key":"87_CR5","doi-asserted-by":"crossref","unstructured":"Meadows, C.A.: Formal verification of cryptographic protocols: a survey. In: International Conference on the Theory and Application of Cryptology. Springer, Heidelberg (1994)","DOI":"10.21236\/ADA464292"},{"issue":"1","key":"87_CR6","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/JSAC.2002.806125","volume":"21","author":"CA Meadows","year":"2003","unstructured":"Meadows, C.A.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1), 44\u201354 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"87_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, J., Miura, J.: Deontic relevant logic as the logical basis for specifying, verifying, and reasoning about information security and information assurance. In: Proceedings of the 1st International Conference on Availability, Reliability, and Security, pp. 601\u2013608. IEEE-CS (2006)","DOI":"10.1109\/ARES.2006.48"},{"key":"87_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, J., Nara, S., Goto, Y.: FreeEnCal: a forward reasoning engine with general-purpose. In: Proceedings of the 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, vol. 4693, pp. 444\u2013452. Springer-Verlag, Heidelberg (2007)","DOI":"10.1007\/978-3-540-74827-4_56"},{"key":"87_CR9","volume-title":"Model Checking","author":"EM Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.: Model Checking. MIT Press, Cambridge (1999)"},{"issue":"3\u20134","key":"87_CR10","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s10817-010-9187-9","volume":"46","author":"V Cortier","year":"2011","unstructured":"Cortier, V., Steve, K., Bogdan, W.: A survey of symbolic methods in computational analysis of cryptographic systems. J. Autom. Reasoning 46(3\u20134), 225\u2013259 (2011)","journal-title":"J. Autom. Reasoning"},{"key":"87_CR11","doi-asserted-by":"crossref","unstructured":"Cremers, C.: On the protocol composition logic PCL. In: Proceedings of the 2008 ACM Symposium on Information, Computer, and Communications Security, pp. 66\u201376. ACM (2008)","DOI":"10.1145\/1368310.1368324"},{"key":"87_CR12","unstructured":"Cremers, C.: Scyther User Manual (2014)"},{"key":"87_CR13","doi-asserted-by":"crossref","unstructured":"Futatsugi, K., Diaconescu, R.: CafeOBJ report. World Scientific (1998)","DOI":"10.1142\/3831"},{"key":"87_CR14","doi-asserted-by":"crossref","unstructured":"Heidorn, G.E.: Automatic programming through natural language dialogue: a survey. In: Readings in Artificial Intelligence and Software Engineering, pp. 203\u2013214 (1986)","DOI":"10.1016\/B978-0-934613-12-5.50019-7"},{"key":"87_CR15","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"C Paulson","year":"1998","unstructured":"Paulson, C.: The inductive approach to verifying cryptographic protocols. J. Comput. Secur. 6, 85\u2013128 (1998)","journal-title":"J. Comput. Secur."},{"key":"87_CR16","doi-asserted-by":"crossref","unstructured":"Wagatsuma, K., Shogo, A., Goto, Y., Cheng, J.: Formalization for formal analysis of cryptographic protocols with reasoning approach, In: Future Information Technology, Lecture Notes in Electrical Engineering, vol. 309, pp. 211\u2013218. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-642-55038-6_32"},{"key":"87_CR17","doi-asserted-by":"crossref","unstructured":"Wagatsuma, K., Harada, T., Anze, S., Goto, Y., Cheng J.: A supporting tool for spiral model of cryptographic protocol design with reasoning-based formal analysis, In: Advanced Multimedia and Ubiquitous Engineering - Future Information Technology, LNEE, vol. 354, pp. 25\u201332. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-662-47895-0_4"},{"key":"87_CR18","doi-asserted-by":"crossref","unstructured":"Yan, J., Wagatsuma, K., Gao, H., Cheng, J.: A formal analysis method with reasoning for cryptographic protocols. In: Proceedings of the 12th International Conference on Computational Intelligence and Security, pp. 566\u2013570. IEEE Computer Society (2016)","DOI":"10.1109\/CIS.2016.0138"}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Multimedia and Ubiquitous Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5041-1_87","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T12:09:29Z","timestamp":1569326969000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5041-1_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811050404","9789811050411"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5041-1_87","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}