{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:26:14Z","timestamp":1725686774737},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1109\/csf54842.2022.9919664","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:29:20Z","timestamp":1667525360000},"page":"305-318","source":"Crossref","is-referenced-by-count":0,"title":["Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol"],"prefix":"10.1109","author":[{"given":"Felipe","family":"Boeira","sequence":"first","affiliation":[{"name":"Link&#x00F6;ping University,Dept. of Computer and Information Science,Sweden"}]},{"given":"Mikael","family":"Asplund","sequence":"additional","affiliation":[{"name":"Link&#x00F6;ping University,Dept. of Computer and Information Science,Sweden"}]}],"member":"263","reference":[{"journal-title":"Std 1609 2a Security Services for Applications and Management Messages - Amendment 1","year":"2017","key":"ref13"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501981"},{"journal-title":"Std 1609 2 Security Services for Applications and Management Messages","year":"2016","key":"ref12"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"journal-title":"TS 103 097 Security header and certificate formats v1 3 1","year":"2017","key":"ref15"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68063-7_10"},{"journal-title":"Std 1609 2b Security Services for Applications and Management Messages - Amendment 2 PDU Functional Types and Encryption Key Management","year":"2019","key":"ref14"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49162-7_12"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(01)00359-0"},{"journal-title":"Converting tamarin to extended alice&bob protocol specifications","year":"2016","author":"kozmai","key":"ref30"},{"year":"2019","key":"ref11"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","article-title":"Sigma: The &#x2018;sign-and-mac&#x2019; approach to authenticated diffie-hellman and its use in the ike protocols","author":"krawczyk","year":"2003","journal-title":"Advances in Cryptology - CRYPTO 2003"},{"year":"2019","key":"ref10"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467823"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2001-9302"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243846"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31810-1_12"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-28641-4_2","article-title":"Security protocol verification: Symbolic and computational models","author":"blanchet","year":"2012","journal-title":"Principles of Security and Trust"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2991168"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.35"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"journal-title":"Advancing Automated Security Protocol Verification","year":"2013","author":"meier","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref26","first-page":"359","article-title":"Automated un-bounded verification of stateful cryptographic protocols with exclusive or","author":"dreier","year":"0","journal-title":"2018 IEEE 31st Computer Security Foundations Symposium (CSF)"},{"journal-title":"Formal Analysis of Key Exchange Protocols and Physical Protocols","year":"2012","author":"schmidt","key":"ref25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46666-7_12"},{"key":"ref22","first-page":"1","article-title":"A formal analysis of {IEEE} 802.11's wpa2: Countering the kracks caused by cracking the counters","author":"cremers","year":"0","journal-title":"29th USENIX Security Symposium ( USENIX Security 20)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_23"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-191358"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-030-59013-0_1","article-title":"Automatic generation of sources lemmas in tamarin: Towards automatic proofs of security protocols","author":"cortier","year":"2020","journal-title":"Computer Security - ESORICS 2020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596782"},{"journal-title":"TR 21 915 Summary of ReI-15 Work Items (Release 15) v15 0 0","year":"2019","key":"ref8"},{"journal-title":"D2 9 Security framework of platooning","year":"2019","key":"ref7"},{"year":"2020","key":"ref9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(01)00139-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_24"},{"journal-title":"Platooning Protocol Definition and Communication Strategy","year":"2018","key":"ref6"},{"key":"ref5","first-page":"696","article-title":"The tamarin prover for the symbolic analysis of security protocols","author":"meier","year":"2013","journal-title":"Computer Aided Verification"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.19"}],"event":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","start":{"date-parts":[[2022,8,7]]},"location":"Haifa, Israel","end":{"date-parts":[[2022,8,10]]}},"container-title":["2022 IEEE 35th Computer Security Foundations Symposium (CSF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9919409\/9919636\/09919664.pdf?arnumber=9919664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:26:52Z","timestamp":1699486012000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9919664\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/csf54842.2022.9919664","relation":{},"subject":[],"published":{"date-parts":[[2022,8]]}}}