{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:47:47Z","timestamp":1742914067225,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540562467"},{"type":"electronic","value":"9783540474883"}],"license":[{"start":{"date-parts":[[1992,1,1]],"date-time":"1992-01-01T00:00:00Z","timestamp":694224000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1992]]},"DOI":"10.1007\/bfb0013903","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T07:24:15Z","timestamp":1132730655000},"page":"273-292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A formal framework for authentication"],"prefix":"10.1007","author":[{"given":"Colin","family":"Boyd","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,9]]},"reference":[{"key":"15_CR1","unstructured":"I.Adjubi, G.Scollo & M.van Sinderen, Formal Description of the OSI Session Layer: Introduction, in The Formal Description Technique LOTOS, P.H.J.van Eijk, C.A.Vissers, M.Diaz (Eds.), North-Holland 1989."},{"issue":"No1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/0169-7552(87)90085-7","volume":"14","author":"T. Bolognesi","year":"1987","unstructured":"T.Bolognesi & E.Brinksma, Introduction to the ISO Specification Language LOTOS, Computer Networks and ISDN Systems, Vol 14, No 1, 1987, pp 25\u201359.","journal-title":"Computer Networks and ISDN Systems"},{"issue":"No6","key":"15_CR3","first-page":"433","volume":"137","author":"C.A. Boyd","year":"1990","unstructured":"C.A.Boyd, Hidden Assumptions in Cryptographic Protocols, Proceedings of IEE, Part E, Vol 137, No 6, November 1990, pp433\u2013436.","journal-title":"Proceedings of IEE, Part E"},{"issue":"Number1871","key":"15_CR4","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"M.Burrows, M.Abadi and R.Needham, A Logic of Authentication, Proceedings of the Royal Society, Series A, Volume 426, Number 1871, December 1989, pp233\u2013271.","journal-title":"Proceedings of the Royal Society"},{"key":"15_CR5","unstructured":"ISO DP 10181-2, Security Frameworks for Open Systems \u2014 Part 2: Authentication Framework."},{"key":"15_CR6","unstructured":"CCITT X509, The Directory \u2014 Authentication Framework, November 1987."},{"key":"15_CR7","unstructured":"ISO JTC1\/SC21 N6765, Guide to Open System Security, February 1992."},{"key":"15_CR8","unstructured":"ISO 7498\/2 Open Systems Interconnection Model Security Architecture"},{"key":"15_CR9","unstructured":"ISO 8807: LOTOS \u2014 A Formal Description Technique Based on the Temporal Ordering of Observational Behaviour, 1988."},{"key":"15_CR10","unstructured":"A.K.Marshall, Introduction to LOTOS Tools, in The Formal Description Technique LOTOS, P.H.J.van Eijk, C.A.Vissers, M.Diaz (Eds.), North-Holland 1989."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"C.Meadows, A System for the Specification and Analysis of Key Management Protocols, Proceedings of the 1991 IEEE Computer Society Symposium on Security and Privacy, pp. 182\u2013195, IEEE Computer Society Press, 1991.","DOI":"10.1109\/RISP.1991.130786"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"J.K.Millen, S.C.Clark & S.B.Freedman, The Interrogator: Protocol Security Analysis, IEEE Transactions on Software Engineering, SE-13, No. 2, February 1987.","DOI":"10.1109\/TSE.1987.233151"},{"issue":"12","key":"15_CR13","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"R.M.Needham & M.D.Schroeder, Using Encryption for Authentication in Large Networks of Computers, Communications of the ACM, 21,12, December 1978, pp.993\u2013999.","journal-title":"Communications of the ACM"},{"issue":"8","key":"15_CR14","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1145\/361082.361089","volume":"17","author":"G.B. Purdy","year":"1974","unstructured":"G.B.Purdy, A High Security Log-in Procedure, Communications of the ACM, 17,8,August 1974, pp.442\u2013445.","journal-title":"Communications of the ACM"},{"key":"15_CR15","unstructured":"V.Varadharajan & S.Black, Formal Specification of a Secure Distributed Message System, Proceedings of 12th National Computer Security Centre Conference, Baltimore, 1989."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0013903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T21:36:35Z","timestamp":1736112995000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0013903"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992]]},"ISBN":["9783540562467","9783540474883"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/bfb0013903","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1992]]},"assertion":[{"value":"9 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}