{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:30:01Z","timestamp":1729636201152,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icumt.2009.5345641","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T15:43:49Z","timestamp":1260459829000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["A syntactic approach for identifying multi-protocol attacks"],"prefix":"10.1109","author":[{"given":"Bela","family":"Genge","sequence":"first","affiliation":[]},{"given":"Piroska","family":"Haller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Laboratoire Specification et Verification Security Protocol Open Repository","year":"2008","key":"15"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2000.856942"},{"year":"0","key":"14"},{"journal-title":"SAML V2 0 OASIS Standard Specification","year":"2007","key":"11"},{"journal-title":"OASIS Web Services Security (WSS)","year":"2006","key":"12"},{"key":"3","first-page":"378","article-title":"11Towards an automatic analysis of security protocols","volume":"1632","author":"weidenbach","year":"1999","journal-title":"Lecture Notes in Artificial Intelligence"},{"key":"2","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","article-title":"11Strand spaces: Proving security protocols correct","volume":"7","author":"fabrega","year":"1999","journal-title":"Journal of Computer Security"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31810-1_12"},{"key":"10","article-title":"Scyther","author":"cremers","year":"2006","journal-title":"Semantics and Verification of Security Protocols"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1996.503701"},{"key":"6","article-title":"The Dolev-Yao Intruder is the Most Powerful Attacker","author":"cervesato","year":"2001","journal-title":"16th Annual IEEE Symposium on Logic in Computer Science LICS'01"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2000.856923"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212705"}],"event":{"name":"2009 International Conference on Ultra Modern Telecommunications & Workshops. ICUMT 2009","start":{"date-parts":[[2009,10,12]]},"location":"St. Petersburg","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 International Conference on Ultra Modern Telecommunications &amp; Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340227\/5345316\/05345641.pdf?arnumber=5345641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T12:02:20Z","timestamp":1558699340000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5345641\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icumt.2009.5345641","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}