{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:08:15Z","timestamp":1772021295861,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csfw.2002.1021817","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T18:04:13Z","timestamp":1056564253000},"page":"206-220","source":"Crossref","is-referenced-by-count":32,"title":["Game analysis of abuse-free contract signing"],"prefix":"10.1109","author":[{"given":"S.","family":"Kremer","sequence":"first","affiliation":[]},{"given":"J.-F.","family":"Raskin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"220","article-title":"Abstract interpretation of game properties","author":"henzinger","year":"2000","journal-title":"SAS 2000 Intertional Symposium on Static Analysis Lecture Notes in Computer Science"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44685-0_37"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(95)00144-2"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","article-title":"Breaking and fixing the Needham-Schroeder public-key protocol using FDR","volume":"1055","author":"lowe","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-61770-1_46","article-title":"Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches","volume":"1146","author":"meadows","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"key":"ref15","article-title":"Certified E-mail with invisible post offices","author":"micali","year":"1997","journal-title":"Available from Author An Invited Presentation at the RSA '97 Conference"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596788"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1998.683155"},{"key":"ref18","first-page":"119","article-title":"Analysis of a fair exchange protocol","author":"shmatikov","year":"2000","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref19","first-page":"174","article-title":"Analysis of abuse-free contract signing","author":"shmatikov","year":"2000","journal-title":"Financial Cryptography '00 volume 1962 of Lecture Notes in Computer Science"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674826"},{"key":"ref3","first-page":"8","article-title":"Optimistic protocols for fair exchange","volume":"6","author":"asokan","year":"0","journal-title":"4th ACM Conference on Computer and Communications Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/74850.74852"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44456-4_16"},{"key":"ref8","author":"even","year":"1980","journal-title":"Relations among Public Key Signature Systems"},{"key":"ref7","first-page":"176","article-title":"Inductive methods and contract-signing protocols","author":"chadha","year":"0","journal-title":"8-th ACM Conference on Computer and Communications Security"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1007\/BFb0028774","article-title":"Mocha: modularity in model checking","volume":"1427","author":"alur","year":"1998","journal-title":"CAV 98 Computer-aided Verification Lecture Notes in Computer Science"},{"key":"ref9","first-page":"449","article-title":"Abuse-free optimistic contract signing","author":"garay","year":"1999","journal-title":"Advances in Cryptology Proceedings of Crypto'99 volume 1666 of Lecture Notes in Computer Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646098"},{"key":"ref20","article-title":"Finite-state analysis of two contract signing protocols","author":"shmatikov","year":"2001","journal-title":"Special issue of Theoretical Computer Science on security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596801"},{"key":"ref21","first-page":"370","article-title":"Towards verification of nonrepudiation protocols","author":"zhou","year":"1998","journal-title":"Proceedings of 1998 International Refinement Workshop and Formal Methods Pacific"}],"event":{"name":"15th IEEE Computer Security Foundations Workshop CSFW-15","location":"Cape Breton, NS, Canada","acronym":"CSFW-02"},"container-title":["Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7957\/21985\/01021817.pdf?arnumber=1021817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:42:46Z","timestamp":1497552166000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1021817\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/csfw.2002.1021817","relation":{},"subject":[]}}