{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:56:05Z","timestamp":1725533765945},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642023835"},{"type":"electronic","value":"9783642023842"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02384-2_15","type":"book-chapter","created":{"date-parts":[[2009,6,18]],"date-time":"2009-06-18T00:37:08Z","timestamp":1245285428000},"page":"235-253","source":"Crossref","is-referenced-by-count":5,"title":["Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps"],"prefix":"10.1007","author":[{"given":"Manuel","family":"Barbosa","sequence":"first","affiliation":[]},{"given":"Pooya","family":"Farshim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-540-45187-7_23","volume-title":"CONCUR 2003 - Concurrency Theory","author":"M. Backes","year":"2003","unstructured":"Backes, M.: Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions. In: Amadio, R., Lugiez, D. (eds.) CONCUR 2003. LNCS, vol.\u00a02761, pp. 350\u2013365. Springer, Heidelberg (2003)"},{"key":"15_CR2","first-page":"419","volume-title":"The 30th Annual ACM Symposium on Theory of Computing","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: The 30th Annual ACM Symposium on Theory of Computing, pp. 419\u2013428. ACM Press, New York (1998)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 531\u2013545. Springer, Heidelberg (2000)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"15_CR5","first-page":"57","volume-title":"Proceedings of the 27th Annual Symposium on the Theory of Computing","author":"M. Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Provably Secure Session Key Distribution: The Three Party Case. In: Proceedings of the 27th Annual Symposium on the Theory of Computing, pp. 57\u201366. ACM Press, New York (1995)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"15_CR7","first-page":"87","volume-title":"2008 ACM Symposium on Information, Computer and Communications Security","author":"B. Blanchet","year":"2008","unstructured":"Blanchet, B., Jaggard, A.D., Scedrov, A., Tsay, J.-K.: Computationally Sound Mechanised Proofs for Basic and Public-Key Kerberos. In: 2008 ACM Symposium on Information, Computer and Communications Security, pp. 87\u201399. ACM Press, New York (2008)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/11818175_32","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"B. Blanchet","year":"2006","unstructured":"Blanchet, B., Pointcheval, D.: Automated Security Proofs with Sequences of Games. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 537\u2013554. Springer, Heidelberg (2006)"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/SP.2007.19","volume-title":"2007 IEEE Symposium on Security and Privacy","author":"A. Boldyreva","year":"2007","unstructured":"Boldyreva, A., Kumar, V.: Provable-Security Analysis of Authenticated Encryption in Kerberos. In: 2007 IEEE Symposium on Security and Privacy, pp. 92\u2013100. IEEE Computer Society, Los Alamitos (2007)"},{"key":"15_CR10","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/SFCS.2001.959888","volume-title":"42nd IEEE Symposium on Foundations of Computer Science","author":"R. Canetti","year":"2001","unstructured":"Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: 42nd IEEE Symposium on Foundations of Computer Science, pp. 136\u2013145. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013474. Springer, Heidelberg (2001)"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-46035-7_22","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"R. Canetti","year":"2002","unstructured":"Canetti, R., Krawczyk, H.: Universally Composable Notions of Key-Exchange and Secure Channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 337\u2013351. Springer, Heidelberg (2002)"},{"issue":"8","key":"15_CR13","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D.E. Denning","year":"1981","unstructured":"Denning, D.E., Sacco, G.M.: Timestamps in Key Distribution Protocols. Communications of the ACM\u00a024(8), 533\u2013536 (1981)","journal-title":"Communications of the ACM"},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/130704.130709","volume":"26","author":"L. Gong","year":"1992","unstructured":"Gong, L.: A Security Risk of Depending on Synchronized Clocks. ACM SIGOPS Operating Systems Review\u00a026(1), 49\u201353 (1992)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"15_CR15","unstructured":"ISO\/IEC 11770-2: Information Technology \u2013 Security Techniques \u2013 Key Management \u2013 Part 2: Mechanisms Using Symmetric Techniques (2008)"},{"key":"15_CR16","unstructured":"ISO\/IEC 9798-2: Information Technology \u2013 Security Techniques \u2013 Entity Authentication \u2013 Part 2: Mechanisms Using Symmetric Encipherment Algorithms (1999)"},{"key":"15_CR17","unstructured":"ISO\/IEC 9798-3: Information Technology \u2013 Security Techniques \u2013 Entity Authentication \u2013 Part 3: Mechanisms Using Digital Signature Techniques (1998)"},{"key":"15_CR18","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"2001","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2001)"},{"key":"15_CR19","unstructured":"Newman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos Network Authentication Service, V5 (2005), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc4120"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02384-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T16:58:49Z","timestamp":1552064329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02384-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642023835","9783642023842"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02384-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}