{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:55:44Z","timestamp":1729644944792,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/memcod.2005.1487898","type":"proceedings-article","created":{"date-parts":[[2005,7,27]],"date-time":"2005-07-27T13:52:28Z","timestamp":1122472348000},"page":"89-98","source":"Crossref","is-referenced-by-count":7,"title":["Verification of low-level crypto-protocol implementations using automated theorem proving"],"prefix":"10.1109","author":[{"given":"J.","family":"Jurjens","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/3-540-47813-2_4","article-title":"Analyzing cryptographic protocols in a reactive framework","volume":"2294","author":"shyamasundar","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1007\/10722086_34"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1016\/S0020-0190(97)00180-4"},{"key":"23","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1007\/3-540-48660-7_29","article-title":"Towards an automatic analysis of security protocols in first-order logic","volume":"1632","author":"weidenbach","year":"1999","journal-title":"Lecture Notes in Computer Science"},{"key":"18","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/3-540-63104-6_12","article-title":"Automatic verification of cryptographic protocols with SETHEO","volume":"1249","author":"schumann","year":"1997","journal-title":"Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/HASE.1999.809478"},{"year":"2004","key":"16"},{"year":"2004","author":"ju?rjens","journal-title":"Security Analysis Tool (Webinterface and Download)","key":"13"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/ICSE.2005.236369"},{"key":"11","article-title":"Practical security analysis of C programs using automatic theorem provers","volume":"itb 51","author":"ju?rjens","year":"2004","journal-title":"Technical Report"},{"year":"2004","author":"ju?rjens","journal-title":"Secure Systems Development with UML","key":"12"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1007\/978-0-387-35608-2_48"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/INFCOM.1999.751458"},{"year":"2001","author":"sutcliffe","journal-title":"The TPTP problem library for automated theorem proving","key":"20"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/POLICY.2003.1206969"},{"year":"2004","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1002\/stvr.228"},{"key":"7","article-title":"Undecidability of bounded security protocols","author":"durgin","year":"1999","journal-title":"1999 Workshop on Formal Methods and Security Protocols"},{"key":"6","doi-asserted-by":"crossref","first-page":"189","DOI":"10.3233\/JCS-2003-11203","article-title":"First-order verification of cryptographic protocols","volume":"11","author":"cohen","year":"2003","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/DAC.2003.1219026"},{"key":"4","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-540-24730-2_15","article-title":"A tool for checking ANSI-C programs","volume":"2988","author":"clarke","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1007\/3-540-48119-2_39"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/TIT.1983.1056650"}],"event":{"acronym":"MEMCOD-05","name":"Third ACM & amp; IEEE International Conference on Formal Methods and Models for Co-Design","location":"Verona, Italy"},"container-title":["Proceedings. Second ACM and IEEE International Conference on Formal Methods and Models for Co-Design, 2005. MEMOCODE '05."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9956\/32009\/01487898.pdf?arnumber=1487898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T22:30:20Z","timestamp":1552084220000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1487898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/memcod.2005.1487898","relation":{},"subject":[]}}