{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:19:50Z","timestamp":1729628390771,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/iscc.2007.4381524","type":"proceedings-article","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T16:55:20Z","timestamp":1194972920000},"page":"481-488","source":"Crossref","is-referenced-by-count":1,"title":["Validating Attacks on Authentication Protocols"],"prefix":"10.1109","author":[{"given":"Anders Moen","family":"Hagalisletto","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Errors in Attacks on Authentication Protocols","author":"anders","year":"2007","journal-title":"Accepted for publication in IEEE The Second International Conference on Availability Reliability and Security (ARES 2007)"},{"key":"ref11","first-page":"67","article-title":"Relating the symbolic and computational models of security protocols using hashes","author":"romain","year":"2006","journal-title":"Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"53","DOI":"10.3233\/JCS-1998-61-204","article-title":"Casper: A compiler for the analysis of security protocols","volume":"6","author":"lowe","year":"1998","journal-title":"Journal of Computer Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(92)90182-F"},{"key":"ref4","article-title":"A Survey of Authentication Protocol Literature","author":"clark","year":"1997","journal-title":"Version 1 0 Unpublished Report"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","article-title":"OFMC: A symbolic model checker for security protocols","volume":"4","author":"david","year":"2005","journal-title":"International Journal of Information Security"},{"key":"ref6","article-title":"The CAPSL integrated protocol environment","author":"millen","year":"2000","journal-title":"Technical Report SRI-CLS-2000-02 SRI"},{"key":"ref5","first-page":"155","article-title":"A logic for constraint-based security protocol analysis","author":"ricardo","year":"2006","journal-title":"Security and Privacy"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021808"},{"key":"ref7","article-title":"Analyzing a Library of Security Protocols using Casper and FDR","author":"ben","year":"1999","journal-title":"Proceedings of the Workshop on Formal Methods and Security Protocols"},{"key":"ref2","first-page":"428","article-title":"Symbolic and Cryptographic Analysis of the Secure WS-Reliable Messaging Scenario","volume":"3921","author":"backes","year":"2006","journal-title":"Proc FoSSaCS 2006"},{"key":"ref1","first-page":"39","article-title":"Security protocols and their properties","author":"martin","year":"1999","journal-title":"Foundations of Secure Computation NATO Science Series"},{"key":"ref9","first-page":"394","article-title":"Protocol Algebra","author":"anders","year":"2006","journal-title":"11th IEEE Symposium on Computers and Communications"}],"event":{"name":"2007 IEEE Symposium on Computers and Communications","start":{"date-parts":[[2007,7,1]]},"location":"Santiago, Portugal","end":{"date-parts":[[2007,7,4]]}},"container-title":["2007 IEEE Symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4381469\/4381470\/04381524.pdf?arnumber=4381524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T07:02:20Z","timestamp":1556953340000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4381524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iscc.2007.4381524","relation":{},"ISSN":["1530-1346"],"issn-type":[{"type":"print","value":"1530-1346"}],"subject":[],"published":{"date-parts":[[2007,7]]}}}