{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T00:49:46Z","timestamp":1676767786032},"reference-count":25,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2014,11,20]],"date-time":"2014-11-20T00:00:00Z","timestamp":1416441600000},"content-version":"vor","delay-in-days":4341,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2003,1]]},"DOI":"10.1016\/s1571-0661(04)00246-4","type":"journal-article","created":{"date-parts":[[2004,1,29]],"date-time":"2004-01-29T10:14:39Z","timestamp":1075371279000},"page":"85-100","source":"Crossref","is-referenced-by-count":3,"title":["Information based reasoning about security protocols"],"prefix":"10.1016","volume":"55","author":[{"given":"R.","family":"Ramanujam","sequence":"first","affiliation":[]},{"given":"S.P.","family":"Suresh","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB1","doi-asserted-by":"crossref","unstructured":"Abadi M. and Gordon, A.D., \u201cA calculus for cryptographic protocols: The spi calculus\u201d, 4th ACM Conf. on Comp and Comm Security, ACM Press, 1997.","DOI":"10.1145\/266420.266432"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB2","doi-asserted-by":"crossref","unstructured":"Bieber P., \u201cA logic of communication in a hostile environment\u201d, 3rd Computer security foundations workshop, IEEE Press, 1990, 14\u201322.","DOI":"10.1109\/CSFW.1990.128181"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB3","doi-asserted-by":"crossref","unstructured":"Bolignano D., \u201cTowards a mechanization of cryptographic protocol verification\u201d, CAV'97, LNCS 1254, 1997, 131\u2013142.","DOI":"10.1007\/3-540-63166-6_15"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB4","doi-asserted-by":"crossref","unstructured":"Boyd C., and Mao W., \u201cOn a limitation of BAN logic\u201d, Eurocrypt'93, LNCS, 1993, 240\u2013247.","DOI":"10.1007\/3-540-48285-7_20"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB5","doi-asserted-by":"crossref","unstructured":"Burrows M., Abadi M. and Needham R., \u201cA logic of authentication\u201d, Proceedings of the Royal Society, 426 (1871), 1989, 233\u2013271.","DOI":"10.1145\/74850.74852"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB6","series-title":"12-th IEEE Computer Security Foundations Workshop","article-title":"\u201cA Meta-notation for Protocol Analysis\u201d","author":"Cervesato","year":"1999"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB7","unstructured":"Durgin, N.A., Lincoln, P.D., Mitchell, J.C. and Scedrov A., \u201cThe undecidability of bounded security protocols\u201d, Workshop on Formal Methods and Security Protocols (FMSP'99). Electronic proceedings available at: http:\/\/www.cs.bell-labs.com\/who\/nch\/fmsp99\/program.html, 1999."},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB8","article-title":"\u201cAnalysis of security protocols\u201d","volume":"Vol. 173","author":"Durgin","year":"1999"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB9","series-title":"ICFEM'97","article-title":"\u201cFormal automatic verification of authentication protocols\u201d","author":"Debbabi","year":"1997"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB10","series-title":"Reasoning about knowledge","author":"Fagin","year":"1995"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB11","doi-asserted-by":"crossref","unstructured":"Genet T. and Klay F., \u201cRewriting for cryptographic protocol verification\u201d Technical report, CNET-France Telecom, 1999.","DOI":"10.1007\/10721959_21"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB12","series-title":"IEEE Computer Security symposium","first-page":"234","article-title":"\u201cReasoning about belief in cryptographic protocols\u201d","author":"Gong","year":"1990"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB13","doi-asserted-by":"crossref","unstructured":"Goubault-Larrecq J., \u201cA method for automatic cryptographic protocol verification\u201d, IPDPS, LNCS 1800, 2000, 977\u2013984.","DOI":"10.1007\/3-540-45591-4_134"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB14","doi-asserted-by":"crossref","unstructured":"Jacquemard F., Rusinowitch M. and Vigneron L., \u201cCompiling and verifying security protocols\u201d, LPAR, LNCS 1955, 2000.","DOI":"10.1007\/3-540-44404-1_10"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB15","unstructured":"Kindred D. and Wing, J.M., \u201cFast automatic checking of security protocols\u201d, 2nd USENIX workshop on e-commerce, 1996, 41\u201352."},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB16","doi-asserted-by":"crossref","unstructured":"Lowe G., \u201cBreaking and fixing the Needham - Schroeder public key protocol using FD\u201d, TACAS 96, LNCS 1055, 1996, 147\u2013166.","DOI":"10.1007\/3-540-61042-1_43"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB17","doi-asserted-by":"crossref","unstructured":"Marrero W., Clarke, E. M. and Jha S., \u201cModel checking for security protocols\u201d, DIMACS Workshop on design and verificaton of security protocols, 1997.","DOI":"10.21236\/ADA327281"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB18","series-title":"Encyclopedia of Soft Engg","article-title":"\u201cSecurity models\u201d","author":"McLean","year":"1994"},{"issue":"1","key":"10.1016\/S1571-0661(04)00246-4_NEWBIB19","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1992-1102","article-title":"\u201cApplying formal methods to the analysis of a key management protocol\u201d","volume":"1","author":"Meadows","year":"1992","journal-title":"Journal of computer security"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB20","doi-asserted-by":"crossref","unstructured":"Monniaux D., \u201cAbstracting cryptographic protocols with tree automata\u201d, Static analysis symposium, LNCS 1694, 1999.","DOI":"10.1007\/3-540-48294-6_10"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB21","doi-asserted-by":"crossref","unstructured":"Monniaux D., \u201cDecision procedures for the analysis of cryptographic protocols by logics of belief\u201d, 12th computer security foundations workshop, IEEE, 1999.","DOI":"10.1109\/CSFW.1999.779761"},{"issue":"2","key":"10.1016\/S1571-0661(04)00246-4_NEWBIB22","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/382258.382789","article-title":"\u201cA critique of the Burrows, Abadi and Needham logic\u201d","volume":"24","author":"Nessett","year":"1990","journal-title":"ACM Operating systems review"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB23","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","article-title":"\u201cThe inductive approach to verifying cryptographic protocols\u201d","volume":"vol 6","author":"Paulson","year":"1998","journal-title":"Journal of computer security"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB24","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/S0168-0072(98)00045-1","article-title":"\u201cView based explicit knowledge\u201d","volume":"vol 96","author":"Ramanujam","year":"1999","journal-title":"Annals of Pure and Applied Logic"},{"key":"10.1016\/S1571-0661(04)00246-4_NEWBIB25","series-title":"13th IEEE Symp. on security and privacy","first-page":"14","article-title":"\u201cOn unifying some cryptographic protocol logics\u201d","author":"Syverson","year":"1994"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104002464?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104002464?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,29]],"date-time":"2020-03-29T12:27:09Z","timestamp":1585484829000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104002464"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,1]]}},"alternative-id":["S1571066104002464"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)00246-4","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2003,1]]}}}