{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:27:47Z","timestamp":1729661267436,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/ipdps.2006.1639686","type":"proceedings-article","created":{"date-parts":[[2006,7,10]],"date-time":"2006-07-10T15:59:56Z","timestamp":1152547196000},"page":"8 pp.","source":"Crossref","is-referenced-by-count":3,"title":["Automated refinement of security protocols"],"prefix":"10.1109","author":[{"given":"A.M.","family":"Hagalisletto","sequence":"first","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"10","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","article-title":"The inductive approach to verifying cryptographic protocols","volume":"6","author":"paulson","year":"1998","journal-title":"Journal of Computer Security"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"journal-title":"Casper - a compiler for the analysis of security protocols","year":"1998","author":"lowe","key":"7"},{"key":"6","first-page":"147","article-title":"Breaking and Fixing the Noodham-Schroeder Public-Key Protocol Using FDR","author":"lowe","year":"1996","journal-title":"Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1111\/j.0824-7935.2004.00249.x"},{"year":"0","key":"4"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(95)00095-X"},{"key":"11","first-page":"73","article-title":"A first step towards the automatic generation of security protocols","author":"perrig","year":"2000","journal-title":"the Symposium on Network and Distributed System Security NDSS-95"},{"key":"12","article-title":"Strand spaces: Proving security protocols correct","volume":"7","author":"thayer","year":"1999","journal-title":"Journal of Computer Security"}],"event":{"name":"Proceedings 20th IEEE International Parallel & Distributed Processing Symposium","start":{"date-parts":[[2006,4,25]]},"location":"Rhodes Island, Greece","end":{"date-parts":[[2006,4,29]]}},"container-title":["Proceedings 20th IEEE International Parallel &amp; Distributed Processing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10917\/34366\/01639686.pdf?arnumber=1639686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T19:22:49Z","timestamp":1555701769000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1639686\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2006.1639686","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}