{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T07:48:57Z","timestamp":1771573737955,"version":"3.50.1"},"reference-count":6,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1995,11,1]],"date-time":"1995-11-01T00:00:00Z","timestamp":815184000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Processing Letters"],"published-print":{"date-parts":[[1995,11]]},"DOI":"10.1016\/0020-0190(95)00144-2","type":"journal-article","created":{"date-parts":[[2003,5,12]],"date-time":"2003-05-12T19:55:41Z","timestamp":1052769341000},"page":"131-133","source":"Crossref","is-referenced-by-count":392,"title":["An attack on the Needham-Schroeder public-key authentication protocol"],"prefix":"10.1016","volume":"56","author":[{"given":"Gavin","family":"Lowe","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0020-0190(95)00144-2_BIB1","doi-asserted-by":"crossref","DOI":"10.1109\/RISP.1994.296587","article-title":"Prudent engineering practice for cryptographic protocols","author":"Abadi","year":"1994"},{"key":"10.1016\/0020-0190(95)00144-2_BIB2","first-page":"233","article-title":"A logic of authentication","volume":"426","author":"Burrows","year":"1989"},{"key":"10.1016\/0020-0190(95)00144-2_BIB3","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/0020-0190(95)00144-2_BIB4","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1145\/358722.358740","article-title":"Timestamps in key distribution protocols","volume":"24","author":"Denning","year":"1981","journal-title":"Comm. ACM"},{"key":"10.1016\/0020-0190(95)00144-2_BIB5","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","article-title":"Using encryption for authentication in large networks of computers","volume":"21","author":"Needham","year":"1978","journal-title":"Comm. ACM"},{"key":"10.1016\/0020-0190(95)00144-2_BIB6","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Comm. ACM"}],"container-title":["Information Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0020019095001442?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0020019095001442?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T22:58:56Z","timestamp":1555282736000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0020019095001442"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,11]]},"references-count":6,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1995,11]]}},"alternative-id":["0020019095001442"],"URL":"https:\/\/doi.org\/10.1016\/0020-0190(95)00144-2","relation":{},"ISSN":["0020-0190"],"issn-type":[{"value":"0020-0190","type":"print"}],"subject":[],"published":{"date-parts":[[1995,11]]}}}