{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:25:52Z","timestamp":1725456352711},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540640400"},{"type":"electronic","value":"9783540696889"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0028167","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T06:50:22Z","timestamp":1132642222000},"page":"159-176","source":"Crossref","is-referenced-by-count":1,"title":["SG logic \u2014 a formal analysis technique for authentication protocols"],"prefix":"10.1007","author":[{"given":"Sigrid","family":"G\u00fcrgens","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,15]]},"reference":[{"key":"13_CR1","series-title":"A Semantics for a Logic of Authentication","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/112600.112618","volume-title":"Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing","author":"M. Abadi","year":"1991","unstructured":"Abadi, M., Tuttle, MR.: A Semantics for a Logic of Authentication. Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, Montreal, Canada, August 1991, pp. 201\u2013216."},{"key":"13_CR2","volume-title":"A Logic of Authentication. Report 39 Digital Systems Research Center","author":"M. Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. Report 39 Digital Systems Research Center, Palo Alto, California, 1989."},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Carlsen, U.: Using Logics to Detect Implementation-Dependent Flaws. Ninth Annual Computer Security Applications Conference, De. 6-10, 1993, Orlando, Florida, pp. 64\u201373.","DOI":"10.1109\/CSAC.1993.315453"},{"key":"13_CR4","unstructured":"CCITT Recommandation X.509-ISO\/IEC 9594\/8 (1987)"},{"issue":"8","key":"13_CR5","first-page":"533","volume":"24","author":"D.E. Denning","year":"1982","unstructured":"Denning, D.E., Sacco, G.M.: Timestamps in Key Distribution Protocols. CALM Vol. 24, No. 8, August 1982, pp. 533\u2013536.","journal-title":"CALM"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"ElGamal, T.,: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms, IEEE Transactions on Information Theory, Vol.31, NrA, July 1985, S.469\u2013472","DOI":"10.1109\/TIT.1985.1057074"},{"issue":"2","key":"13_CR7","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00196790","volume":"3","author":"K. Gaarder","year":"1991","unstructured":"Gaarder, K., Snekkenes, E.: Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol. J. Cryptology, Vol. 3, No. 2 (1991) 81\u201398.","journal-title":"J. Cryptology"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., Yahalom, R.: Reasoning about Belief in Cryptographic Protocols. Proc. 1990 IEEE Symp. on Security and Privacy (Oakland, California), pp. 234\u2013248.","DOI":"10.1109\/RISP.1990.63854"},{"key":"13_CR9","unstructured":"G\u00fcergens, S.: A Formal Analysis Technique for Authentication Protocols. Proceedings of Pragocrypt 1996."},{"key":"13_CR10","unstructured":"ISO\/IEC 7816-4: 1995(E) \u201cInformation technology-Identification cards-Integrated circuit(s) cards with contacts-Part 4: Inter-industry commands for interchange\u201d"},{"key":"13_CR11","unstructured":"WD 7816-8: 1995(E) \u201cInformation technology-Identification cards-Integrated circuit(s) cards with contacts-Part 8: Security related interindustry commandsx\u201d"},{"key":"13_CR12","unstructured":"ISO\/IEC 9798-2: 1994(E) \u201cInformation technology-Security techniques-Entity authentication-Part 2: Mechanisms using encipherment algorithms\u201d"},{"key":"13_CR13","unstructured":"Mathuria, A., Safavi-Naini, R, Nickolas, P.: Some Remarks on the Logic of Gong, Needham and Yahalom. Proceedings of the International Computer Symposium 1994, Dec. 12-15, NCTU, Hsinchu, Taiwan, R.O.C, Vol.1, pp. 303\u2013308"},{"issue":"12","key":"13_CR14","first-page":"993","volume":"21","author":"R. M. Needham","year":"1978","unstructured":"Needham, R. M., Schroeder, M. D.: Authentication Revisited. Operating Systems Review, Vol. 21, No. 12, December 1978, pp. 993\u2013999.","journal-title":"Operating Systems Review"},{"issue":"2","key":"13_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/155848.155852","volume":"27","author":"B.C. Neuman","year":"1993","unstructured":"Neuman, B.C., Stubblebine, S.G.: A note on the use of timestamps as Nonces. Operating Systems Rev. 27 (2), 1993, pp. 10\u201314.","journal-title":"Operating Systems Rev."},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Rivest, R. L., Shamir, A., Adleman, L. A.: A method for obtaining digital signatures and public-key cryptosystems; Communications of the ACM, Vol.21, Nr.2, 1978, 5.120-126.","DOI":"10.1145\/359340.359342"},{"issue":"4","key":"13_CR17","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/163640.163642","volume":"27","author":"P. Syverson","year":"1993","unstructured":"Syverson, P.: On Key Distribution Protocols for Repeated Authentication; Operating Systems Review, vol. 27, no. 4, October 1993, pp. 24\u201330.","journal-title":"Operating Systems Review"},{"key":"13_CR18","series-title":"Extending Cryptographic Logics of Belief to Key Agreement Protocols","first-page":"232","volume-title":"1st ACM Conference on Computer and Communications Security","author":"P.C. Oorschot Van","year":"1993","unstructured":"Van Oorschot, P.C.: Extending Cryptographic Logics of Belief to Key Agreement Protocols. 1st ACM Conference on Computer and Communications Security, Nov. 3-5 1993, Fairfax, Virginia, pp. 232\u2013243."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T02:49:14Z","timestamp":1586573354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028167"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540640400","9783540696889"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/bfb0028167","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}