{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:28:57Z","timestamp":1761596937838},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540640400"},{"type":"electronic","value":"9783540696889"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0028162","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T06:50:22Z","timestamp":1132642222000},"page":"91-104","source":"Crossref","is-referenced-by-count":51,"title":["Protocol interactions and the chosen protocol attack"],"prefix":"10.1007","author":[{"given":"John","family":"Kelsey","sequence":"first","affiliation":[]},{"given":"Bruce","family":"Schneier","sequence":"additional","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,15]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"R. Anderson, \u201cRobustness Principles for Public Key Protocols,\u201d Advances in Cryptology-CRYPTO '95, Springer-Verlag, 1995, pp. 236\u2013247.","DOI":"10.1007\/3-540-44750-4_19"},{"key":"8_CR2","unstructured":"R. Anderson personal communication, 1997."},{"key":"8_CR3","unstructured":"R. Anderson, \u201cPerfect Forward Secrecy\u201d, presented at the rump session of Eurocrypt '97, 1997."},{"key":"8_CR4","unstructured":"R. Anderson, M. Kuhn, \u201cLow Cost Attacks on Tamper Resistant Devices,\u201d these proceedings."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"D. Balenson, \u201cPrivacy Enhancement for Internet Electronic Mail: Part III \u2014 Algorithms, Modes, and Identifiers,\u201d RFC 1423, Feb 1993.","DOI":"10.17487\/rfc1423"},{"issue":"1","key":"8_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"M. Burrows, M. Abadi, and R. Needham, \u201cA Logic of Authentication,\u201d ACM Transactions on Computer Systems, v. 8, n. 1, Feb 1990, pp. 18\u201336.","journal-title":"ACM Transactions on Computer Systems"},{"key":"8_CR7","unstructured":"I. Curry, \u201cEntrust Overview, Version 1.0,\u201d Entrust Technologies, Oct. 96. http:\/\/www.entrust.com\/downloads\/overview.pdf"},{"key":"8_CR8","unstructured":"S. Dusse, \u201cS\/MIME Message Specification: PKCS Security Services for MIME,\u201d IETF Networking Group Internet Draft, Sep 1996. ftp:\/\/ietf.org\/internet-drafts\/draft-dusse-mime-msg-spec-OO.txt"},{"key":"8_CR9","unstructured":"A. Freier, P. Karlton, and P. Kocher, \u201cThe SSL Protocol Version 3.0\u201d, ftp:\/\/ftp.netscape. com\/pub\/review\/ssl-spec.tar. Z,March 4 1996, Internet Draft, work in progress."},{"key":"8_CR10","unstructured":"L. Gong and P. Syverson, \u201cFail-Stop Protocols: An Approach to Designing Secure Protocols,\u201d Fifth International Working Conference on Dependable Computing for Critical Applications, Sept. 1995."},{"key":"8_CR11","unstructured":"E. Gabber and A. Silberschatz, \u201cAgora: A Minimal Distributed Protocol for Electronic Commerce,\u201d The Second USENIX Workshop on Electronic Commerce Proceedings, USENIX Association, 1996, pp. 223\u2013232."},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"B.S. Kaliski, \u201cPrivacy Enhancement for Internet Electronic Mail: Part. IV \u2014 Key Certificates and Related Services,\u201d RFC 1424, Feb 1993.","DOI":"10.17487\/rfc1424"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"S.T Kent, \u201cPrivacy Enhancement for Internet Electronic Mail: Part II \u2014 Certificate Based Key Management,\u201d RFC; 1422, Feb 1993.","DOI":"10.17487\/rfc1422"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"J. Linn, \u201cPrivacy Enhancement for Internet Electronic Mail: Part I \u2014 Message Encipherment and Authentication Procedures,\u201d RFC 1421, Feb 1993.","DOI":"10.17487\/rfc1421"},{"key":"8_CR15","unstructured":"R. Morris, invited talk at Crypto '96."},{"key":"8_CR16","unstructured":"A. J. Menezes, P. C. Van Oorschot, S. A. Vanstone, Handbook of Applied Cryptography, p. 418, CRC Press, 1997."},{"key":"8_CR17","unstructured":"van Ooorschot, \u201cStandards Supported by Entrust, Version 2.0,\u201d Entrust Technologies, Dec 1996.http:\/\/www.entrust.com\/downloads\/standards.pdf"},{"key":"8_CR18","unstructured":"RSA Data Security, Inc., \u201cS\/MIME Implementation Guide Interoperability Profiles, Version 2,\u201d S\/MIME Editor, Draft, Oct 1996. ftp:\/\/ftp.rsa.com\/pub\/S-MIME\/IMPGV2.txt"},{"key":"8_CR19","unstructured":"B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996."},{"key":"8_CR20","unstructured":"B. Schneier, E-Mail Security, John Wiley & Sons, 1995."},{"key":"8_CR21","unstructured":"B. Schneier and C. Hall, \u201cAn Improved E-Mail Security Protocol,\u201d in preparation."},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"J. Tardo and K. Alagappan, \u201cSPX: Global Authentication Using Public Key Certificates,\u201d Proceedings of the 1991 IEEE Computer Society Symposium on Security and Privacy, 1991, pp. 232\u2013244.","DOI":"10.1109\/RISP.1991.130791"},{"key":"8_CR23","unstructured":"J. Tardo, K. Alagappan, and R. Pitkin, \u201cPublic Key Based Authentication Using Internet Certificates,rd USENIX Security II Workshop Proceedings, 1990, pp. 121\u2013123."},{"key":"8_CR24","unstructured":"Visa and MasterCard, \u201cSecure Electronic Transaction (SET) Specification, Books 1\u20133\u201d June 1996, http:\/\/www.visa. com.cgi-bin\/vee\/sf\/set \/ \/intro.html or http:\/\/www.mastercard.com\/set\/set.htm."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T02:49:28Z","timestamp":1586573368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028162"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540640400","9783540696889"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/bfb0028162","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}