{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T05:16:45Z","timestamp":1739078205949,"version":"3.37.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2001,9,1]],"date-time":"2001-09-01T00:00:00Z","timestamp":999302400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["New Gener Comput"],"published-print":{"date-parts":[[2001,9]]},"DOI":"10.1007\/bf03037600","type":"journal-article","created":{"date-parts":[[2009,4,24]],"date-time":"2009-04-24T03:28:01Z","timestamp":1240543681000},"page":"283-299","source":"Crossref","is-referenced-by-count":1,"title":["Web security: Authentication protocols and their analysis"],"prefix":"10.1007","volume":"19","author":[{"given":"Wu","family":"Wen","sequence":"first","affiliation":[]},{"given":"Fumio","family":"Mizoguchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03037600_CR1","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M. and Needham, R., \u201cA Logic of Authentication,\u201dTechnical Report 39, DEC Systems Research Center, February 1989.","DOI":"10.1145\/74850.74852"},{"key":"BF03037600_CR2","unstructured":"CCITT. \u201cThe Directory-authentication Framwork,\u201dTechnical report, X509, 1987."},{"key":"BF03037600_CR3","doi-asserted-by":"crossref","unstructured":"Clarke, E., Jha, S. and Marrero, W., \u201cUsing State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols,\u201dIFIP Working Conference on Programming Concepts and Methods, 1998.","DOI":"10.1007\/978-0-387-35358-6_10"},{"issue":"8","key":"BF03037600_CR4","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D. Denning","year":"1981","unstructured":"Denning, D. and Sacco, G., \u201cTimestamps in Key Distribution Protocols,\u201dCommunications of the ACM, 24, 8, pp. 533\u2013536, 1981.","journal-title":"Communications of the ACM"},{"key":"BF03037600_CR5","doi-asserted-by":"crossref","unstructured":"Dierks, T. and Allen, C., \u201cThe tls protocl: Version 1.0,\u201dTechnical Report dratietf-tls-rptocol-05.txt.Z., IETF task force, May 1998.","DOI":"10.17487\/rfc2246"},{"key":"BF03037600_CR6","series-title":"Technical report","volume-title":"Transport Level Security: A Proof Using the Gny Logic","author":"W. D. Eaves","year":"1989","unstructured":"Eaves, W. D., \u201cTransport Level Security: A Proof Using the Gny Logic,\u201dTechnical report, Brunel University, UK February 1989."},{"key":"BF03037600_CR7","unstructured":"Ellison. C. et al., \u201cSpki Certificate Theory, Internet Draft,\u201dTechnical Report, IETF SPKI Working Group, November 1997."},{"key":"BF03037600_CR8","unstructured":"Freier, A., Kocher, P. and Kaltorn, P., \u201cSSL v3.0 Specification,\u201d Technical Report http: \/\/home.netscape.com\/eng\/ssl3\/s-SPEC.HTM, IETF task force, March 1996."},{"key":"BF03037600_CR9","first-page":"342","volume":"1751","author":"I. Gassko","year":"2000","unstructured":"Gassko, I., Gemmell, P. and MacKenzie, P., \u201cEfficient and Fresh Certification,\u201dLNCS, Springer Verlag, 1751, pp. 342\u2013353, January 2000.","journal-title":"LNCS"},{"key":"BF03037600_CR10","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R. and Yahalom, R., \u201cReasoning about Belief in Cryptographic Protocols,\u201d inIEEE Symposium on Research in Security and Privacy, Oakland, California, 1990.","DOI":"10.1109\/RISP.1990.63854"},{"issue":"3","key":"BF03037600_CR11","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1145\/322510.322514","volume":"2","author":"S Halevi","year":"1999","unstructured":"Halevi, S and Krawczyk, H., \u201cPublic-key Cryptography and Password Protocols,\u201dACM Transactions on Information and System Security, 2, 3, pp. 230\u2013268, August 1999.","journal-title":"ACM Transactions on Information and System Security"},{"key":"BF03037600_CR12","doi-asserted-by":"crossref","unstructured":"Lowe, G.,Breaking and Fixing the Needham-schroeder Public Key Protocol Using csp and fdr, inTACS96, 1996.","DOI":"10.1007\/3-540-61042-1_43"},{"issue":"2","key":"BF03037600_CR13","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","volume":"26","author":"C. Meadows","year":"1996","unstructured":"Meadows, C., \u201cThe nrl Protocol Analyzer: an Overview,\u201dJournal of Logic Programming, 26, 2, pp. 113\u2013131, February 1996.","journal-title":"Journal of Logic Programming"},{"key":"BF03037600_CR14","doi-asserted-by":"crossref","unstructured":"Millen, J., \u201cThe Interogator Model,\u201d inIEEE Computer Society Symposium on Security and Privacy, pp. 251\u2013260, 1995.","DOI":"10.1109\/SECPRI.1995.398937"},{"key":"BF03037600_CR15","unstructured":"Mitchell, J, Mitchell, M. and Stern, U., \u201cAutomated Analysis of Cryptographic Protocols Using Murphi,\u201d inIEEE Symposium on Security and Privacy, pp. 141\u2013151, 1997."},{"key":"BF03037600_CR16","unstructured":"Mitchell, J., Shmatikov, V. and Stern, U., \u201cFinite-state Analysis of ssl 3.0,\u201d inSeven\u2019s USENIX Security Symposium, pp. 201\u2013216, San Antonio, 1998."},{"issue":"12","key":"BF03037600_CR17","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"Needham R. and Shroeder, M., \u201cUsing Encryption for Authentication in Large Networks of Computers,\u201dCommunications of the ACM, 21, 12, pp. 993\u2013999, 1978.","journal-title":"Communications of the ACM"},{"issue":"2","key":"BF03037600_CR18","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/382258.382789","volume":"24","author":"D. Nessett","year":"1990","unstructured":"Nessett, D., \u201cA Critique of the Burrows, Abadi and Needham Logic,\u201dACM Operating Systems Review, 24, 2, pp. 35\u201338, April 1990.","journal-title":"ACM Operating Systems Review"},{"issue":"9","key":"BF03037600_CR19","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B. Neuman","year":"1994","unstructured":"Neuman, B. and Ts\u2019o, T., \u201cAn Authentication Service for Computer Networks,\u201dIEEE Communications, 32, 9, pp. 33\u201338, September 1994.","journal-title":"IEEE Communications"},{"issue":"1","key":"BF03037600_CR20","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/24592.24594","volume":"21","author":"D. Otway","year":"1987","unstructured":"Otway, D. and Rees, O., \u201cEfficient and Timely Mutual Authentication,\u201dOperating Systems Review, 21, 1, pp. 8\u201310, 1987.","journal-title":"Operating Systems Review"},{"key":"BF03037600_CR21","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L. Paulson","year":"1998","unstructured":"Paulson, L., \u201cThe Inductive Approach to Verifying Cryptographic Protocols,\u201dJournal of Computer Security, 6, pp. 85\u2013128, 1998.","journal-title":"Journal of Computer Security"},{"key":"BF03037600_CR22","doi-asserted-by":"crossref","unstructured":"Rivest, R., \u201cCan We Eliminate Revocation Lists?\u201d inFinancial Cryptography, 1998.","DOI":"10.1007\/BFb0055482"},{"key":"BF03037600_CR23","unstructured":"Saito, T., Wen, W. and Mizoguchi, F., \u201cAnalysis of Authentication Protocol by Parameterized Ban Logic,\u201dTechnical report, ISEC, July 1999."},{"key":"BF03037600_CR24","unstructured":"Song, D., \u201cAthena: a New Efficent Automatic Checker for Security Protocol Analysis,\u201d inIEEE Symposium on Security and Privacy 1998."},{"key":"BF03037600_CR25","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/0-387-34805-0_30","volume":"435","author":"M. Tatebayashi","year":"1990","unstructured":"Tatebayashi, M., Matsuzaki, N. and Newman D., \u201cKey Distribution Protocol for Digital Mobile Communication Systems,\u201dLecture Notes in Computer Science, 435, pp. 324\u2013333, 1990.","journal-title":"Lecture Notes in Computer Science"},{"key":"BF03037600_CR26","unstructured":"Thayer, F., Herzog, J. and Guttman, J., \u201cWhy is a Security Protocol Correct?\u201d inIEEE Symposium on Security and Privacy, 1998."},{"key":"BF03037600_CR27","unstructured":"Wagner, D. and Schneider, B., \u201cAnalysis of the ssl 3.0 Protocol,\u201d inThe Second USENIX Workshop on Electronic Commerce, November 1996."},{"issue":"8","key":"BF03037600_CR28","first-page":"54","volume":"41","author":"W. Wen","year":"2000","unstructured":"Wen, W., Saito, T. and Mizoguchi, F., \u201cAttacks on Authentications Protocols with Compromised Certificates and How to Fix Them,\u201dTransactions of the Information Processing Society of Japan, 41, 8, pp. 54\u201365, August 2000.","journal-title":"Transactions of the Information Processing Society of Japan"},{"key":"BF03037600_CR29","first-page":"196","volume":"1751","author":"W. Wen","year":"2000","unstructured":"Wen, W., Saito, T. and Mizoguchi, F., \u201cSecurity of Public-key Based Authentication Protocol,\u201dLNCS, Springer Verlag, 1751, pp. 196\u2013209, January 2000.","journal-title":"LNCS"},{"issue":"4","key":"BF03037600_CR30","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/271019.271023","volume":"31","author":"S. Xu","year":"1997","unstructured":"Xu, S., Zhang, G. and Zhu, H., \u201cOn the Properties of Cryptographic Protocols and the Weaknesses of the Ban-like Logics,\u201dACM Operating Systems Review, 31, 4, pp. 12\u201323, 1997.","journal-title":"ACM Operating Systems Review"}],"container-title":["New Generation Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03037600.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF03037600\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03037600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T04:41:41Z","timestamp":1739076101000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF03037600"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,9]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2001,9]]}},"alternative-id":["BF03037600"],"URL":"https:\/\/doi.org\/10.1007\/bf03037600","relation":{},"ISSN":["0288-3635","1882-7055"],"issn-type":[{"type":"print","value":"0288-3635"},{"type":"electronic","value":"1882-7055"}],"subject":[],"published":{"date-parts":[[2001,9]]}}}