{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T16:44:58Z","timestamp":1682613898569},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2003,11,1]],"date-time":"2003-11-01T00:00:00Z","timestamp":1067644800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJIS"],"published-print":{"date-parts":[[2003,11]]},"DOI":"10.1007\/s10207-003-0021-9","type":"journal-article","created":{"date-parts":[[2003,12,11]],"date-time":"2003-12-11T00:44:12Z","timestamp":1071103452000},"page":"21-36","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of e-commerce protocols: Adapting a traditional technique"],"prefix":"10.1007","volume":"2","author":[{"given":"Sigrid","family":"G\u00fcrgens","sequence":"first","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Ren\u00e9","family":"Peralta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,11,1]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Bella G, Paulson LC (1998) Kerberos version iv: Inductive analysis of the secrecy goals. In: 5th European Symposium on Research in Computer Security, Lecture Notes in Computer Science. Springer-Verlag, pp 361\u2013375","DOI":"10.1007\/BFb0055875"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Bellare M, Canetti R, Krawczyk H (1998) A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: Annual Symposium on the Theory of Computing. ACM","DOI":"10.1145\/276698.276854"},{"key":"21_CR3","unstructured":"Bellare M, Rogaway P (1995) Provably secure session key distribution \u2013 the three party case. In: Annual Symposium on the Theory of Computing. ACM, pp 57\u201366"},{"key":"21_CR4","unstructured":"Berger R, Kannan S, Peralta R (1985) A framework for the study of cryptographic protocols. In: Advances in Cryptology \u2013 CRYPTO \u201985, Lecture Notes in Computer Science. Springer-Verlag, pp 87\u2013103"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Boyd C (1990) Hidden assumptions in cryptographic protocols. In: IEEE Proceedings 137:433\u2013436","DOI":"10.1049\/ip-e.1990.0054"},{"key":"21_CR6","unstructured":"Brackin S (1999) Automatically detecting authentication limitations in commercial security protocols. In: Proc. of the 22nd National Conference on Information Systems Security"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Burrows M, Abadi M, Needham R (1989) A Logic of Authentication. Report 39, Digital Systems Research Center, Palo Alto, California","DOI":"10.1145\/74850.74852"},{"key":"21_CR8","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/0020-0190(95)00136-Z","volume":"56","author":"Clark","year":"1995","unstructured":"Clark J, Jacob J (1995) On the Security of Recent Protocols. Information Processing Letters 56:151\u2013155","journal-title":"Information Processing Letters"},{"key":"21_CR9","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"Denning","year":"1982","unstructured":"Denning D, Sacco G (1982) Timestamps in key distribution protocols. Communications of the ACM 24:533\u2013536","journal-title":"Communications of the ACM"},{"key":"21_CR10","unstructured":"DIN NI-17 (2000) Chipkarten mit Digitaler Signatur \u2013 Anwendung\/Funktion nach SigG und SigV \u2013 Teil 1: Anwendungsschnittstelle"},{"key":"21_CR11","unstructured":"DIN NI-17.4 (1998) Spezifikation der Schnittstelle zu Chipkarten mit Digitaler Signatur \u2013 Anwendung\/Funktion nach SigG und SigV, Version 1.0 (Draft)"},{"key":"21_CR12","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public-key protocols. IEEE Transactions on Information Theory 29:198\u2013208","journal-title":"IEEE Transactions on Information Theory"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"G\u00fcrgens S, Lopez J (2001) Suitability of a classical analysis method for e-commerce protocols. In: Yair Frankel George I. Davida (ed) Information Security, 4th International Conference, ISC 2001, LNCS, vol 2200. Springer Verlag, pp 46\u201362","DOI":"10.1007\/3-540-45439-X_4"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"G\u00fcrgens S, Lopez J, Peralta R (1999) Efficient Detection of Failure Modes in Electronic Commerce Protocols. In: DEXA \u201999 10th International Workshop on Database and Expert Systems Applications. IEEE Computer Society, pp 850\u2013857","DOI":"10.1109\/DEXA.1999.795293"},{"key":"21_CR15","unstructured":"G\u00fcrgens S, Peralta R (1998) Efficient Automated Testing of Cryptographic Protocols. report 45, GMD German National Research Center for Information Technology, Darmstadt, Germany"},{"key":"21_CR16","unstructured":"G\u00fcrgens S, Peralta R (2000) Validation of Cryptographic Protocols by Efficient Automated Testing. In: FLAIRS2000. AAAI Press, pp 7\u201312"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Heintze N, Tygar JD (1994) A Model for Secure Protocols and their Compositions. In: 1994 IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Computer Society Press, pp 2\u201313","DOI":"10.1109\/RISP.1994.296596"},{"key":"21_CR18","unstructured":"ISO\/IEC (1997) ISO\/IEC CD 7816-8.2: \u201cIdentification cards \u2013 Integrated circuit(s) cards with contacts \u2013 Part 8: Security related interindustry commands\u201d"},{"key":"21_CR19","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1109\/32.502224","volume":"22","author":"Kailar","year":"1996","unstructured":"Kailar R (1996) Accountability in Electronic Commerce Protocols. IEEE Transactions on Software Engineering 22(5):313\u2013328","journal-title":"IEEE Transactions on Software Engineering"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Kohl J, Neuman C (1993) The Kerberos Network Authentication Service (V5). Network Working Group, Request for Comments 1510","DOI":"10.17487\/rfc1510"},{"key":"21_CR21","unstructured":"Lowe G (1996) Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In: Second International Workshop, TACAS \u201996, LNCS, vol 1055. SV, pp 147\u2013166"},{"key":"21_CR22","unstructured":"Marrero W, Clarke EM, Jha S (1997) A Model Checker for Authentication Protocols. In: DIMACS Workshop on Cryptographic Protocol Design and Verification, http:\/\/dimacs.rutgers.edu\/Workshops\/Security\/"},{"key":"21_CR23","unstructured":"Meadows C (1991) A system for the specification and verification of key management protocols. In: IEEE Symposium on Security and Privacy. IEEE Computer Society Press, New York, pp 182\u2013195"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Meadows C (1995) Formal Verification of Cryptographic Protocols: A Survey. In: Advances in Cryptology \u2013 Asiacrypt \u201994, LNCS, vol 917. SV, pp 133\u2013150","DOI":"10.1007\/BFb0000430"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Meadows C (1996) Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches. In: Proceedings of ESORICS, Naval Research Laboratory. Springer","DOI":"10.1007\/3-540-61770-1_46"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Meadows C, Syverson P (1998) A formal specification of requirements for payment transactions in the SET protocol. In: Proceedings of Financial Cryptography","DOI":"10.1007\/BFb0055477"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Needham R, Schroeder M (1978) Using encryption for authentication in large networks of computers. Communications of the ACM, pp 993\u2013999","DOI":"10.1145\/359657.359659"},{"key":"21_CR28","unstructured":"Ostrovsky R, Yung M (1991) How to withstand mobile virus attacks. In: Proceedings of PODC, pp 51\u201359"},{"key":"21_CR29","unstructured":"O\u2019Toole K (1994) The Internet Billing Server \u2013 Transaction Protocol Alternatives. Technical Report INI TR 1994-1, Carnegie Mellon University, Information Networking Institute"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Pancho S (1999) Paradigm shifts in protocol analysis. In: New Security Paradigms Workshop","DOI":"10.1145\/335169.335198"},{"key":"21_CR31","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"Paulson","year":"1998","unstructured":"Paulson LC (1998) The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6:85\u2013128","journal-title":"Journal of Computer Security"},{"key":"21_CR32","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1145\/322510.322530","volume":"2","author":"Paulson","year":"1999","unstructured":"Paulson LC (1999) Inductive Analysis of the Internet Protocol TLS. ACM Trans. on Information and System Security 2(3):332\u2013351","journal-title":"on Information and System Security"},{"key":"21_CR33","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman LA (1978) A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2):120\u2013126","journal-title":"Communications of the ACM"},{"key":"21_CR34","unstructured":"Rudolph C (2001) A Model for Secure Protocols and its Application to Systematic Design of Cryptographic Protocols. PhD thesis, Queensland University of Technology"},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"Schneider S (1997) Verifying authentication protocols with CSP. In: IEEE Computer Security Foundations Workshop. IEEE","DOI":"10.1109\/CSFW.1997.596775"},{"key":"21_CR36","doi-asserted-by":"crossref","unstructured":"Schneider S (1998) Formal Analysis of a non-repudiation Protocol. In: IEEE Computer Security Foundations Workshop. IEEE","DOI":"10.1109\/CSFW.1998.683155"},{"key":"21_CR37","doi-asserted-by":"crossref","unstructured":"Shoup V, Rubin A (1996) Session key distribution using smart card. In: Advances in Cryptology \u2013 EUROCRYPT \u201996, LNCS, vol 1070. SV, pp 321\u2013331","DOI":"10.1007\/3-540-68339-9_28"},{"key":"21_CR38","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/BF00197941","volume":"7","author":"Simmons","year":"1994","unstructured":"Simmons GJ (1994) Proof of Soundness (Integrity) of Cryptographic Protocols. Journal of Cryptology 7(2):69\u201377","journal-title":"Journal of Cryptology"},{"key":"21_CR39","doi-asserted-by":"crossref","unstructured":"Syverson P (1997) A Different Look at Secure Distributed Computation. In: 10th Computer Security Foundations Workshop. IEEE, pp 109\u2013115","DOI":"10.1109\/CSFW.1997.596797"},{"key":"21_CR40","doi-asserted-by":"crossref","unstructured":"Syverson P, Meadows C, Cervesato I (2000) Dolev-Yao is no better than Machiavelli. In: Proceedings of WITS 2000, Workshop on Issues in the Theory of Security, pp 87\u201392","DOI":"10.21236\/ADA464936"},{"key":"21_CR41","unstructured":"Tatebayashi M, Matsuzaki N, Newman D (1991) Key Distribution Protocol for Digital Mobile Communication Systems. In: Brassard G (ed) Advances in Cryptology \u2013 CRYPTO \u201989, LNCS, vol 435. SV, pp 324\u2013333"},{"key":"21_CR42","unstructured":"Wos L, Overbeek R, Lusk E, Boyle J (1992) Automated Reasoning \u2013 Introduction and Applications. McGraw-Hill, Inc."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0021-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-003-0021-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0021-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T16:26:11Z","timestamp":1682612771000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-003-0021-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,11]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,11]]}},"alternative-id":["21"],"URL":"https:\/\/doi.org\/10.1007\/s10207-003-0021-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,11]]}}}