{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:43:39Z","timestamp":1729629819698,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/icdim.2013.6693967","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T12:10:38Z","timestamp":1389010238000},"page":"35-40","source":"Crossref","is-referenced-by-count":2,"title":["Applying authentication tests to discover Man-In-The-Middle attack in security protocols"],"prefix":"10.1109","author":[{"given":"Shahabuddin","family":"Muhammad","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","article-title":"Strand spaces: Proving security protocols correct","volume":"7","author":"fabrega","year":"1999","journal-title":"Journal of Computer Security"},{"key":"22","first-page":"147","article-title":"Breaking and fixing the Needham-Schroeder public-key protocol using FDR","author":"lowe","year":"1996","journal-title":"Tools and Algorithms for the Construction and Analysis of Systems 2nd International Workshop TACAS'96"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/155848.155852"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1016\/S0304-3975(01)00139-6"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/2.108052"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/ICNICONSMCL.2006.76"},{"year":"1999","author":"dierks","journal-title":"The TLS Protocol Version 1 0 RFC 2246","key":"16"},{"key":"13","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/3-540-17906-2_31","article-title":"Event structures","author":"winskel","year":"1987","journal-title":"Petri Nets Applications and Relationships to Other Models of Concurrency"},{"year":"1997","author":"clark","journal-title":"A Survey of Authentication Protocol Literature Version 1 0 Tech Rep","key":"14"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1016\/j.entcs.2004.05.020"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1007\/978-3-642-25327-0_19"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1145\/359657.359659"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/RISP.1990.63854"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/CSFW.1997.596782"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/77648.77649"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/JSAC.2002.806125"},{"key":"10","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/3-540-45608-2_2","article-title":"The logic of authentication protocols","author":"syverson","year":"2001","journal-title":"Foundations of Security Analysis and Design LNCS 2171"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1007\/s10207-004-0055-7"},{"key":"6","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","article-title":"The inductive approach to verifying cryptographic protocols","volume":"6","author":"paulson","year":"1998","journal-title":"Journal of Computer Security"},{"year":"2000","author":"ryan","journal-title":"Modelling and Analysis of Security Protocols","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1016\/S0304-3975(01)00136-0"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ARITH.1993.378085"},{"key":"8","first-page":"19","article-title":"A model checker for authentication protocols","author":"marrero","year":"1997","journal-title":"DIMACS Workshop on Design and Formal Verification of Security Protocols"}],"event":{"name":"2013 Eighth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2013,9,10]]},"location":"Islamabad, Pakistan","end":{"date-parts":[[2013,9,12]]}},"container-title":["Eighth International Conference on Digital Information Management (ICDIM 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6684408\/6693962\/06693967.pdf?arnumber=6693967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T18:23:14Z","timestamp":1565029394000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6693967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icdim.2013.6693967","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}