{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:08:40Z","timestamp":1760202520014,"version":"3.32.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2006,1,19]],"date-time":"2006-01-19T00:00:00Z","timestamp":1137628800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Autom Reasoning"],"published-print":{"date-parts":[[2006,10,17]]},"DOI":"10.1007\/s10817-005-9019-5","type":"journal-article","created":{"date-parts":[[2006,1,18]],"date-time":"2006-01-18T12:41:53Z","timestamp":1137588113000},"page":"39-83","source":"Crossref","is-referenced-by-count":26,"title":["Formal Analysis of Multiparty Contract Signing"],"prefix":"10.1007","volume":"36","author":[{"given":"Rohit","family":"Chadha","sequence":"first","affiliation":[]},{"given":"Steve","family":"Kremer","sequence":"additional","affiliation":[]},{"given":"Andre","family":"Scedrov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,1,19]]},"reference":[{"key":"9019_CR1","doi-asserted-by":"crossref","unstructured":"Alur, R., Henzinger, T. A. and Kupferman, O. (1997) Alternating-time temporal logic, in 38th Annual Symposium on Foundations of Computer Science (FOCS \u201997), pp. 100\u2013109.","DOI":"10.1109\/SFCS.1997.646098"},{"key":"9019_CR2","doi-asserted-by":"crossref","unstructured":"Asokan, N., Schunter, M. and Waidner, M. (1997) Optimistic protocols for fair exchange, in 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, pp. 7\u201317.","DOI":"10.1145\/266420.266426"},{"key":"9019_CR3","doi-asserted-by":"crossref","unstructured":"Backes, M., Pfitzmann, B. and Waidner, M. (2003) Reactively secure signature schemes, in 6th Information Security Conference (ISC), Vol. 2851 of Lecture Notes in Computer Science, pp. 84\u201395.","DOI":"10.1007\/10958513_7"},{"key":"9019_CR4","unstructured":"Baum-Waidner, B. and Waidner, M. (2000) Round-optimal and abuse free optimistic multi-party contract signing, in Automata, Languages and Programming \u2013 ICALP 2000, Vol. 1853 of Lecture Notes in Computer Science, Geneva, Switzerland, pp. 524\u2013535."},{"issue":"8","key":"9019_CR5","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1016\/0167-4048(90)90114-9","volume":"9","author":"H. Burk","year":"1990","unstructured":"Burk, H. and Pfitzmann, A. (1990) Value exchange systems enabling security and unobservability, in Computers and Security, 9(8), 715\u2013721.","journal-title":"Computers and Security"},{"key":"9019_CR6","unstructured":"Chadha, R., Kanovich, M. and Scedrov, A. (2001) Inductive methods and contractsigning protocols, in 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, pp. 176\u2013185."},{"key":"9019_CR7","doi-asserted-by":"crossref","unstructured":"Chadha, R., Mitchell, J. C., Scedrov, A. and Shmatikov, V. (2003) Contract signing, optimism, and advantage, in R. M. Amadio and D. Lugiez (eds.) CONCUR 2003 \u2013 Concurrency Theory, Vol. 2761 of Lecture Notes in Computer Science, pp. 361\u2013377.","DOI":"10.1007\/978-3-540-45187-7_24"},{"key":"9019_CR8","doi-asserted-by":"crossref","unstructured":"Chadha, R., Kremer, S. and Scedrov A. (2004a) Formal analysis of multi-party fair exchange protocols, in 17th IEEE Computer Security Foundations Workshop, Asilomar, California, USA, pp. 266\u2013279.","DOI":"10.1109\/CSFW.2004.1310746"},{"issue":"2","key":"9019_CR9","first-page":"189","volume":"64","author":"R. Chadha","year":"2005","unstructured":"Chadha, R., Mitchell, J. C., Scedrov, A. and Shmatikov, V. (2005) Contract signing, optimism, and advantage, Journal of Logic and Algebraic Programming (Special issue on Modeling and Verification of Cryptographic Protocols) 64(2), 189\u2013218.","journal-title":"Journal of Logic and Algebraic Programming (Special Issue on Modeling and Verification of Cryptographic Protocols)"},{"key":"9019_CR10","unstructured":"Crow, J., Owre, S., Rushby, J., Shankar, N. and Srivas, M. (1995) A tutorial introduction to PVS, in Workshop on Industrial-Strength Formal Specification Techniques, Boca Raton, Florida."},{"key":"9019_CR11","doi-asserted-by":"crossref","unstructured":"Das, S. and Dill, D. L. (2001) Successive approximation of abstract transition relations, in Sixteenth Annual IEEE Symposium on Logic in Computer Science (LICS 01), pp. 51\u201360.","DOI":"10.1109\/LICS.2001.932482"},{"key":"9019_CR12","volume-title":"Relations among Public Key Signature Systems, Technical Report 175","author":"S. Even","year":"1980","unstructured":"Even, S., and Yacobi, Y. (1980) Relations among Public Key Signature Systems, Technical Report 175, Technion, Haifa, Israel."},{"key":"9019_CR13","first-page":"151","volume-title":"International Symposium on Distributed Computing, Vol. 1693 of Lecture Notes in Computer Science","author":"J. Garay","year":"1999","unstructured":"Garay, J. A. and MacKenzie, P. D. (1999) Abuse-free multi-party contract signing, in P. Jayanti (ed.) International Symposium on Distributed Computing, Vol. 1693 of Lecture Notes in Computer Science, Bratislava, Slovak Republic, pp. 151\u2013165."},{"key":"9019_CR14","doi-asserted-by":"crossref","unstructured":"Garay, J. A., Jakobsson, M. and MacKenzie, P. D. (1999) Abuse-free optimistic contract signing, in M. J. Wiener (ed.) Advances in Cryptology \u2013 Crypto 1999, Vol. 1666 of Lecture Notes in Computer Science, pp. 449\u2013466.","DOI":"10.1007\/3-540-48405-1_29"},{"key":"9019_CR15","doi-asserted-by":"crossref","unstructured":"G\u00fcrgens, S. and Rudolph, C. (2003) Security analysis of (un-)fair non-repudiation protocols, in A. E. Abdallah, P. Ryan, and S. A. Schneider (eds.) Formal Aspects of Security, Vol. 2629 of Lecture Notes in Computer Science, London, UK, pp. 97\u2013114.","DOI":"10.1007\/978-3-540-40981-6_10"},{"key":"9019_CR16","doi-asserted-by":"crossref","unstructured":"Henzinger, T. A., Manjumdar, R., Mang, F. Y. and Raskin, J.-F. (2000) Abstract interpretation of game properties, in J. Palsberg (ed.), SAS 2000: International Symposium on Static Analysis, Vol. 1824 of Lecture Notes in Computer Science, Santa Barbara, California, USA, pp. 220\u2013239.","DOI":"10.1007\/978-3-540-45099-3_12"},{"key":"9019_CR17","volume-title":"Game analysis of abuse-free contract signing, in 15th IEEE computer security foundations workshop","author":"S. Kremer","year":"2002","unstructured":"Kremer, S., and Raskin, J.-F. (2002) Game analysis of abuse-free contract signing, in 15th IEEE Computer Security Foundations Workshop, Cape Breton, Canada."},{"key":"9019_CR18","doi-asserted-by":"crossref","unstructured":"Nipkow, T., Paulson, L. C. and Wenzel, M. (2002) Sabelle\/HOL \u2013 A Proof Assistant for Higher-order Logic, Vol. 2283 of Lecture Notes in Computer Science, Springer.","DOI":"10.1007\/3-540-45949-9"},{"issue":"2","key":"9019_CR19","first-page":"419","volume":"283","author":"V. Shmatikov","year":"2002","unstructured":"Shmatikov, V. and Mitchell, J. (2002) Finite-state analysis of two contract signing protocols, Theoretical Computer Science (Special Issue on Theoretical Foundations of Security Analysis and Design) 283(2), 419\u2013450.","journal-title":"Theoretical Computer Science (Special Issue on Theoretical Foundations of Security Analysis and Design)"}],"container-title":["Journal of Automated Reasoning"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10817-005-9019-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10817-005-9019-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10817-005-9019-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T06:03:20Z","timestamp":1736229800000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10817-005-9019-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,1,19]]},"references-count":19,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2006,10,17]]}},"alternative-id":["9019"],"URL":"https:\/\/doi.org\/10.1007\/s10817-005-9019-5","relation":{},"ISSN":["0168-7433","1573-0670"],"issn-type":[{"type":"print","value":"0168-7433"},{"type":"electronic","value":"1573-0670"}],"subject":[],"published":{"date-parts":[[2006,1,19]]}}}