{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T20:53:34Z","timestamp":1761339214779,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122843","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T17:01:11Z","timestamp":1326301271000},"page":"338-343","source":"Crossref","is-referenced-by-count":2,"title":["Holistic analysis of mix protocols"],"prefix":"10.1109","author":[{"given":"Giampaolo","family":"Bella","sequence":"first","affiliation":[]},{"given":"Denis","family":"Butin","sequence":"additional","affiliation":[]},{"given":"David","family":"Gray","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"On-line Repository of Protocol Proofs As from Isabelle","year":"2006","author":"bella","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0097-y"},{"key":"11","first-page":"70","author":"paulson","year":"1997","journal-title":"Proving Properties of Security Protocols by Induction"},{"key":"12","first-page":"159","article-title":"Formal verification of cardholder registration in set","volume":"1895","author":"bella","year":"2000","journal-title":"LNCS"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.63"},{"key":"2","first-page":"414","article-title":"The Scyther Tool: Verification, falsification, and analysis of security protocols","volume":"5123","author":"cremers","year":"2008","journal-title":"LNCS"},{"key":"1","first-page":"82","author":"blanchet","year":"1998","journal-title":"An Efficient Cryptographic Protocol Verifier Based on Prolog Rules"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0030541"},{"key":"7","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-61770-1_46","article-title":"Analyzing the needham-schroeder public-key protocol: A comparison of two approaches","author":"meadows","year":"1996","journal-title":"ESORICS"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-68136-6_2","article-title":"Formal Correctness of Security Protocols","author":"bella","year":"2007","journal-title":"Information Security and Cryptography"},{"key":"5","first-page":"85","volume":"6","author":"paulson","year":"1998","journal-title":"The Inductive Approach to Verifying Cryptographic Protocols"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.07.002"},{"key":"9","first-page":"147","article-title":"Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR","volume":"1055","author":"lowe","year":"1996","journal-title":"LNCS"},{"key":"8","first-page":"993","volume":"21","author":"needham","year":"1978","journal-title":"Using Encryption for Authentication in Large Networks of Computers"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122843.pdf?arnumber=6122843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:36:58Z","timestamp":1497947818000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122843\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122843","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}