{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:09:08Z","timestamp":1746245348412,"version":"3.40.4"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819647330","type":"print"},{"value":"9789819647347","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-4734-7_11","type":"book-chapter","created":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T15:09:01Z","timestamp":1746198541000},"page":"211-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Formal Analysis of\u00a0WAPI Authentication and\u00a0Key Agreement Protocol"],"prefix":"10.1007","author":[{"given":"Zhongqi","family":"Lv","sequence":"first","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haisong","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Jingjing","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,3]]},"reference":[{"key":"11_CR1","unstructured":"IEEE Standard 802.11-1999: Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control and Physical Layer Specifications (1999)"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A Armando","year":"2005","unstructured":"Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281\u2013285. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11513988_27"},{"key":"11_CR3","doi-asserted-by":"publisher","unstructured":"Basin, D., Cremers, C., Dreier, J., Sasse, R.: Symbolically analyzing security protocols using tamarin. ACM SIGLOG News 4(4), 19\u201330 (2017). https:\/\/doi.org\/10.1145\/3157831.3157835","DOI":"10.1145\/3157831.3157835"},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R., Stettler, V.: A formal analysis of 5G authentication. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1383\u20131396 (2018). https:\/\/doi.org\/10.1145\/3243734.3243846","DOI":"10.1145\/3243734.3243846"},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"Basin, D., Sasse, R., Toro-Pozo, J.: The EMV standard: break, fix, verify. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1766\u20131781. IEEE (2021). https:\/\/doi.org\/10.1109\/sp40001.2021.00037","DOI":"10.1109\/sp40001.2021.00037"},{"key":"11_CR6","doi-asserted-by":"publisher","unstructured":"Bhargavan, K., Blanchet, B., Kobeissi, N.: Verified models and reference implementations for the TLS 1.3 standard candidate. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 483\u2013502. IEEE (2017). https:\/\/doi.org\/10.1109\/sp.2017.26","DOI":"10.1109\/sp.2017.26"},{"key":"11_CR7","doi-asserted-by":"publisher","unstructured":"Blanchet, B., Cheval, V., Cortier, V.: Proverif with lemmas, induction, fast subsumption, and much more. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 69\u201386. IEEE (2022). https:\/\/doi.org\/10.1109\/sp46214.2022.9833653","DOI":"10.1109\/sp46214.2022.9833653"},{"key":"11_CR8","unstructured":"Blanchet, B., Smyth, B., Cheval, V., Sylvestre, M.: Proverif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. Version from, pp. 05\u201316 (2018). https:\/\/www.crs811.com\/uploads\/2019\/01\/manual.pdf"},{"key":"11_CR9","doi-asserted-by":"publisher","unstructured":"Bussa, S., Sisto, R., Valenza, F.: Formal verification of a V2X privacy preserving scheme using proverif. In: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 341\u2013346. IEEE (2023). https:\/\/doi.org\/10.1109\/csr57506.2023.10224908","DOI":"10.1109\/csr57506.2023.10224908"},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Cremers, C., Dehnel-Wild, M.: Component-based formal analysis of 5G-aka: channel assumptions and session confusion. In: Network and Distributed System Security Symposium (NDSS). Internet Society (2019). https:\/\/doi.org\/10.14722\/ndss.2019.23394","DOI":"10.14722\/ndss.2019.23394"},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Cremers, C., Horvat, M., Hoyland, J., Scott, S., van\u00a0der Merwe, T.: A comprehensive symbolic analysis of TLS 1.3. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1773\u20131788 (2017). https:\/\/doi.org\/10.1145\/3133956.3134063","DOI":"10.1145\/3133956.3134063"},{"key":"11_CR12","unstructured":"Cremers, C., Kiesl, B., Medinger, N.: A formal analysis of IEEE 802.11\u2019s WPA2: countering the kracks caused by cracking the counters. In: 29th USENIX Security Symposium (USENIX Security 2020), pp. 1\u201317. USENIX Association (2020). https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/cremers"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","volume-title":"Computer Aided Verification","author":"C Cremers","year":"2008","unstructured":"Cremers, C.: The scyther tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414\u2013418. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70545-1_38"},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"11_CR15","doi-asserted-by":"publisher","unstructured":"Feng, H., Li, H., Pan, X., Zhao, Z., Cactilab, T.: A formal analysis of the FIDO UAF protocol. In: NDSS (2021). https:\/\/doi.org\/10.14722\/ndss.2021.24363","DOI":"10.14722\/ndss.2021.24363"},{"key":"11_CR16","doi-asserted-by":"publisher","unstructured":"Gasti, P., Tsudik, G., Uzun, E., Zhang, L.: Dos and DDoS in named data networking. In: 2013 22nd International Conference on Computer Communication and Networks (ICCCN), pp.\u00a01\u20137. IEEE (2013). https:\/\/doi.org\/10.1109\/icccn.2013.6614127","DOI":"10.1109\/icccn.2013.6614127"},{"key":"11_CR17","unstructured":"GB 15629. 11: Information Technology - Telecommunication and Information Exchange between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Standards Press of China, China (2003)"},{"key":"11_CR18","unstructured":"GB 15629. 11-2003\/XG1-2006: Information Technology, Remote Communication and Information Exchange Among Systems - The Specific Requirements of LAN and MAN - Part 11: Wireless Local Area Network Specification - 1st Amendment (2006). Standards Press of China, China (2006)"},{"key":"11_CR19","doi-asserted-by":"publisher","unstructured":"Guan, J., Li, H., Ye, H., Zhao, Z.: A formal analysis of the fido2 protocols. In: European Symposium on Research in Computer Security, pp. 3\u201321. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-17143-7_1","DOI":"10.1007\/978-3-031-17143-7_1"},{"key":"11_CR20","doi-asserted-by":"publisher","unstructured":"Hoque, N., Rahbari, H.: Countering relay and spoofing attacks in the connection establishment phase of wi-fi systems. In: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 275\u2013285 (2023). https:\/\/doi.org\/10.1145\/3558482.3590185","DOI":"10.1145\/3558482.3590185"},{"key":"11_CR21","unstructured":"IEEE P802.11i\/D10.0: Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2004)"},{"key":"11_CR22","doi-asserted-by":"publisher","unstructured":"Kobeissi, N., Bhargavan, K., Blanchet, B.: Automated verification for secure messaging protocols and their implementations: a symbolic and computational approach. In: 2017 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 435\u2013450. IEEE (2017). https:\/\/doi.org\/10.1109\/eurosp.2017.38","DOI":"10.1109\/eurosp.2017.38"},{"key":"11_CR23","doi-asserted-by":"publisher","unstructured":"Kobeissi, N., Nicolas, G., Bhargavan, K.: Noise explorer: fully automated modeling and verification for arbitrary noise protocols. In: 2019 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 356\u2013370. IEEE (2019). https:\/\/doi.org\/10.1109\/eurosp.2019.00034","DOI":"10.1109\/eurosp.2019.00034"},{"key":"11_CR24","doi-asserted-by":"publisher","unstructured":"Ku, Z., Chen, N., Hu, Z.: Security analysis of wapi key negotiation protocol. In: 2010 International Symposium on Intelligence Information Processing and Trusted Computing, pp. 581\u2013584. IEEE (2010). https:\/\/doi.org\/10.1109\/iptc.2010.128","DOI":"10.1109\/iptc.2010.128"},{"issue":"4","key":"11_CR25","doi-asserted-by":"publisher","first-page":"576","DOI":"10.3321\/j.issn:0254-4164.2006.04.008","volume":"29","author":"XH Li","year":"2006","unstructured":"Li, X.H., Ma, J.F.: On the security of the key-agreement protocol of Chinese WLAN standard implementation plan. Chin. J. Comput.-Chin. Edition 29(4), 576 (2006). https:\/\/doi.org\/10.3321\/j.issn:0254-4164.2006.04.008","journal-title":"Chin. J. Comput.-Chin. Edition"},{"key":"11_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147\u2013166. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-61042-1_43"},{"key":"11_CR27","doi-asserted-by":"publisher","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: Proceedings 10th Computer Security Foundations Workshop, pp. 31\u201343. IEEE (1997). https:\/\/doi.org\/10.1109\/csfw.1997.596782","DOI":"10.1109\/csfw.1997.596782"},{"key":"11_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/978-3-642-39799-8_48","volume-title":"Computer Aided Verification","author":"S Meier","year":"2013","unstructured":"Meier, S., Schmidt, B., Cremers, C., Basin, D.: The TAMARIN prover for the symbolic analysis of security protocols. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 696\u2013701. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39799-8_48"},{"key":"11_CR29","doi-asserted-by":"publisher","unstructured":"Miculan, M., Vitacolonna, N.: Automated verification of telegram\u2019s mtproto 2.0 in the symbolic model. Comput. Secur. 126, 103072 (2023). https:\/\/doi.org\/10.5220\/0010549601850197","DOI":"10.5220\/0010549601850197"},{"key":"11_CR30","doi-asserted-by":"publisher","unstructured":"Tie, M., Li, J., Huang, Z., Wang, Y.: A correctness proof of WAPI certificate authentication protocol. In: 2007 International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2310\u20132313. IEEE (2007). https:\/\/doi.org\/10.1109\/wicom.2007.576","DOI":"10.1109\/wicom.2007.576"},{"key":"11_CR31","unstructured":"Vanhoef, M.: Fragment and forge: breaking Wi-Fi through frame aggregation and fragmentation. In: 30th USENIX Security Symposium (USENIX Security 2021), pp. 161\u2013178. USENIX Association (2021). https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/vanhoef"},{"key":"11_CR32","doi-asserted-by":"publisher","unstructured":"Vanhoef, M., Piessens, F.: Advanced wi-fi attacks using commodity hardware. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 256\u2013265 (2014). https:\/\/doi.org\/10.1145\/2664243.2664260","DOI":"10.1145\/2664243.2664260"},{"key":"11_CR33","doi-asserted-by":"publisher","unstructured":"Wang, L., Chen, L., Suo, S., Ren, W.: WAPI network for novel intelligent services of substations in smart grid. Application analysis and overview. In: 2022 IEEE 5th International Electrical and Energy Conference (CIEEC). IEEE (2022). https:\/\/doi.org\/10.1109\/cieec54735.2022.9846600","DOI":"10.1109\/cieec54735.2022.9846600"},{"key":"11_CR34","doi-asserted-by":"publisher","unstructured":"Wu, J., Wu, R., Xu, D., Tian, D.J., Bianchi, A.: Formal model-driven discovery of bluetooth protocol design vulnerabilities. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 2285\u20132303. IEEE (2022). https:\/\/doi.org\/10.1109\/sp46214.2022.9833777","DOI":"10.1109\/sp46214.2022.9833777"},{"key":"11_CR35","doi-asserted-by":"publisher","unstructured":"Wu, L., Zhang, Y., et al.: Security analysis of WAPI authentication and key exchange protocol. Cryptology ePrint Archive (2007). https:\/\/doi.org\/10.1007\/978-3-642-23998-4_36","DOI":"10.1007\/978-3-642-23998-4_36"},{"key":"11_CR36","doi-asserted-by":"publisher","unstructured":"Zhu, N., Xu, J., Cui, B.: Formal analysis of 5G EAP-TLS 1.3. In: International Conference on Emerging Internet, Data & Web Technologies, pp. 140\u2013151. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-53555-0_14","DOI":"10.1007\/978-3-031-53555-0_14"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-4734-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T16:03:59Z","timestamp":1746201839000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-4734-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819647330","9789819647347"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-4734-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"3 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2024.github.io\/#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}