{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T10:12:12Z","timestamp":1773223932679,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2003,9,1]],"date-time":"2003-09-01T00:00:00Z","timestamp":1062374400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. &amp; Technol."],"published-print":{"date-parts":[[2003,9]]},"DOI":"10.1007\/bf02947115","type":"journal-article","created":{"date-parts":[[2008,9,12]],"date-time":"2008-09-12T23:50:41Z","timestamp":1221263441000},"page":"553-570","source":"Crossref","is-referenced-by-count":12,"title":["Study on strand space model theory"],"prefix":"10.1007","volume":"18","author":[{"given":"QingGuang","family":"Ji","sequence":"first","affiliation":[]},{"given":"SiHan","family":"Qing","sequence":"additional","affiliation":[]},{"given":"YongBin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"DengGuo","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF02947115_CR1","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume":"1055","author":"G Lowe","year":"1996","unstructured":"Lowe G. Breaking and fixing Needham-Schroeder public-key protocol using FDR.Lecture Notes in Computer Science 1055, Springer Verlag, 1996, pp.147\u2013166.","journal-title":"Lecture Notes in Computer Science"},{"key":"BF02947115_CR2","doi-asserted-by":"crossref","unstructured":"Roscoe A W. Intensional specifications of security protocols. InProc. The 9th Computer Security Foundation Workshop, Kenmare, County Kerry, Ireland, 1996, pp.28\u201338.","DOI":"10.1109\/CSFW.1996.503688"},{"issue":"9","key":"BF02947115_CR3","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1109\/32.713329","volume":"24","author":"S A Schneider","year":"1998","unstructured":"Schneider S A. Verifying authentication protocol in CSP.IEEE Trans. Software Engineering, September, 1998, 24(9): 741\u2013758.","journal-title":"IEEE Trans. Software Engineering"},{"key":"BF02947115_CR4","first-page":"85","volume":"7","author":"L C Paulson","year":"1999","unstructured":"Paulson L C. The inductive approach to verifying cryptographic protocols.Journal of Computer Security, 1999, (7): 85\u2013122.","journal-title":"Journal of Computer Security"},{"key":"BF02947115_CR5","unstructured":"Focardi R, Ghelli A, Gorrieri R. Using noninterference for the analysis of security protocol. InProc. The DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997, http:\/\/dimacs. rutegers.edu\/workshops\/security\/."},{"key":"BF02947115_CR6","unstructured":"Butler M. On the use of data refinement in the development of secure communications system. Technical Report DSSE-TR-2001-1, Declarative Systems and Software Engineering Group, University of Southampton, January 2001."},{"key":"BF02947115_CR7","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"F J Thayer Fabrega","year":"1999","unstructured":"F J Thayer Fabrega, J C Herzog, J D Guttman. Strand speces: Proving security protocols correct.Journal of Computer Security, 1999, (7): 191\u2013230","journal-title":"Journal of Computer Security"},{"issue":"4","key":"BF02947115_CR8","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/334598.334607","volume":"33","author":"Y Zhang","year":"1999","unstructured":"Zhang Y, Li J, Xiao G. An approach to the formal verification of the two-party cryptographic protocols.Operating Systems Review, 1999, 33(4): 48\u201351.","journal-title":"Operating Systems Review"},{"issue":"2","key":"BF02947115_CR9","first-page":"213","volume":"11","author":"Bai Shuo","year":"2000","unstructured":"Bai Shuoet al. The verification logic for secure protocols.Journal of Software, 2000, 11(2): 213\u2013221. (in Chinese)","journal-title":"Journal of Software"},{"key":"BF02947115_CR10","unstructured":"Debbabi M, Mejri M, Tawbi N, Yahmadi I. A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios. InProc. The DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997, http:\/\/dimacs.rutegers.edu\/ workshops\/security\/."},{"key":"BF02947115_CR11","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/S0020-0190(99)00023-X","volume":"69","author":"W G Tzeng","year":"1999","unstructured":"Tzeng W G, Hu C M. Inter-protocol interleaving attacks on some authentication and key distribution protocols.Information Processing Letters, 1999, (69): 297\u2013302.","journal-title":"Information Processing Letters"},{"key":"BF02947115_CR12","doi-asserted-by":"crossref","unstructured":"Kelsey J, Schneier B, Wagner D. Protocol interactions and the chosen protocol attack. InProc. Security Protocols, 5th International Workshop, Spriger Verlage LNCS 1361, 1997, pp.91\u2013104.","DOI":"10.1007\/BFb0028162"},{"key":"BF02947115_CR13","doi-asserted-by":"crossref","unstructured":"Perrig A, Song D. Looking for diamonds in the desert-extending automatic protocol generation to three-party authentication and key agreement protocols. InProc. The 13th Computer Security Foundation Workshop, IEEE Computer Society Press, 2000, pp.64\u201376.","DOI":"10.1109\/CSFW.2000.856926"},{"key":"BF02947115_CR14","unstructured":"Paulson L C. Relations between secrets: Two formal analyses of the Yahalom protocol. Technical Report 432. Computer Laboratory, University of Cambridge, July 1997."},{"key":"BF02947115_CR15","unstructured":"Song D. Athena: A new efficient automatic checker for security protocol analysis. InProc. The 12th Computer Security Foundation Workshop, Mordano, Italy, 1999, pp.192\u2013202."},{"key":"BF02947115_CR16","doi-asserted-by":"crossref","unstructured":"Alello L C, Massacci F. An executable specification language for planning attacks to security protocol. InProc. The 13th Computer Security Foundation Workshop, Cambridge, England, 2000, pp.88\u2013102.","DOI":"10.1109\/CSFW.2000.856928"},{"key":"BF02947115_CR17","unstructured":"Boyd C. Towards extensional goals in authentication protocols. InProc. The DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997, http:\/\/dimacs.rutegers.edu\/workshops\/security\/."},{"key":"BF02947115_CR18","doi-asserted-by":"crossref","unstructured":"Marrero W, Clarke E, Jha S. A model checker for authentication protocols. InProc. The DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997, http:\/\/dimacs.rutegers.edu\/ workshops\/security\/.","DOI":"10.21236\/ADA327281"},{"key":"BF02947115_CR19","first-page":"96","volume-title":"Proc. 2000 IEEE Symp. Security and Privacy","author":"J D Guttman","year":"2000","unstructured":"J D Guttman, F J Thayer Fabrega. Authentication tests. InProc. 2000 IEEE Symp. Security and Privacy, IEEE Computer Society Press, Berkeley, California, May 2000, pp.96\u2013109."},{"key":"BF02947115_CR20","unstructured":"Clark J, Jacob J. A survey of authentication protocol literature: Version 1.0. Available at http:\/\/dcpul. cs.york.ac.uk\/~jeremy, 1997."},{"key":"BF02947115_CR21","doi-asserted-by":"crossref","unstructured":"Burrows M, Abadi M, Needham M R. A logic of authentication. InProc. The Royal Society of London, 1989, 426: 233\u2013271.","DOI":"10.1098\/rspa.1989.0125"},{"key":"BF02947115_CR22","unstructured":"Steve M Bellovin. Problem areas for the IP security protocols. InProc. The Sixth Usenix UNIX Security Symposium, San Jose, California, July 1996, pp.22\u201325."},{"key":"BF02947115_CR23","doi-asserted-by":"crossref","unstructured":"Bird R, Gopal I, Herzberg Aet al. Systematic design of a family of attack-resistant authentication protocols.IEEE Journal on Selected Areas in Communications, June 1993, 11(5).","DOI":"10.1109\/49.223869"},{"key":"BF02947115_CR24","first-page":"269","volume-title":"Proc. 13th Computer Security Foundation Workshop","author":"J Heather","year":"2000","unstructured":"Heather J, Lowe G, Schneider S. How to prevent type flaw attacks on security protocol. InProc. 13th Computer Security Foundation Workshop, MIEEE Computer Society Press, Cambridge, England, 2000, pp.269\u2013284."},{"key":"BF02947115_CR25","unstructured":"Syverson P. A taxonomy of reply attacks. InProc. The 7th IEEE Computer Security Foundations Workshop, Franconia, USA, 1994, pp.131\u2013136."},{"key":"BF02947115_CR26","doi-asserted-by":"crossref","unstructured":"Cervesato I, Durgin N, Mitchell Jet al. Relating strands and multiset rewriting for security protocol analysis, Revised extended abstract. InProc. The 13th Computer Security Foundation Workshop, Cambridge, England, 2000, pp.35\u201351.","DOI":"10.1109\/CSFW.2000.856924"},{"key":"BF02947115_CR27","doi-asserted-by":"crossref","unstructured":"Wu W, Saito T, Mizoguchi F. Security of public key certificate based authentication protocol. InThird International Workshop on Practice and Theory in Public Key Cryptosystems, PKC2000, LNCS 1759, pp.196\u2013209.","DOI":"10.1007\/978-3-540-46588-1_14"},{"key":"BF02947115_CR28","unstructured":"Meadows C. Open issues in formal methods for cryptographic analysis. Available at http:\/\/www.itd.nrl. navy.mil\/ITD\/5540\/publications\/."},{"key":"BF02947115_CR29","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/CSFW.1999.779763","volume-title":"Proc. The 12th IEEE Computer Security Foundation Workshop","author":"F J Thayer Fabrega","year":"1999","unstructured":"F J Thayer Fabrega, J C Herzog, J D Guttman. Mixing protocols. InProc. The 12th IEEE Computer Security Foundation Workshop, IEEE Computer Society Press, Mordano, Italy, June 1999, pp.72\u201382."},{"key":"BF02947115_CR30","doi-asserted-by":"crossref","unstructured":"Lowe G. A heirarchy of authentication specifications. InProc. The 10th Computer Security Foundation Workshop, Rockport, Massachusetts, USA, 1997, pp.31\u201343.","DOI":"10.1109\/CSFW.1997.596782"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02947115.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF02947115\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02947115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T22:48:37Z","timestamp":1738363717000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF02947115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,9]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2003,9]]}},"alternative-id":["BF02947115"],"URL":"https:\/\/doi.org\/10.1007\/bf02947115","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,9]]}}}