{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:33Z","timestamp":1750308213899,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,29]],"date-time":"2004-10-29T00:00:00Z","timestamp":1099008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,29]]},"DOI":"10.1145\/1029133.1029139","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:58:48Z","timestamp":1107107928000},"page":"33-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Stepwise development of security protocols"],"prefix":"10.1145","author":[{"given":"Phan Minh","family":"Dung","sequence":"first","affiliation":[{"name":"Asian Institute of Technologies, Pathumthani, Thailand"}]},{"given":"Phan Minh","family":"Thang","sequence":"additional","affiliation":[{"name":"Asian Institute of Technologies, Pathumthani, Thailand"}]}],"member":"320","published-online":{"date-parts":[[2004,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324266"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.481513"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806133"},{"key":"e_1_3_2_1_4_1","unstructured":"G. Bella F. Massacci L.C. Paulson An overview of the verification of SET International J. of Information security in Press]] G. Bella F. Massacci L.C. Paulson An overview of the verification of SET International J. of Information security in Press]]"},{"key":"e_1_3_2_1_5_1","first-page":"93","volume-title":"Esorics'94","author":"Boyd C.","unstructured":"C. Boyd , W. Mao . Designing secure key exchange protocol , Esorics'94 , pp 93 -- 105 ]] C. Boyd, W. Mao. Designing secure key exchange protocol, Esorics'94, pp 93--105]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/794198.795093"},{"key":"e_1_3_2_1_8_1","volume-title":"Department of Computer Science","author":"Clark J.","year":"1997","unstructured":"J. Clark , J. Jakob . A survey of authentication protocol literature, version 1 , Department of Computer Science , University of York , Nov 1997 ]] J. Clark, J. Jakob. A survey of authentication protocol literature, version 1, Department of Computer Science, University of York, Nov 1997]]"},{"volume-title":"IEEE Computer Security Foundation Workshop","author":"Datta A.","key":"e_1_3_2_1_9_1","unstructured":"A. Datta , A. Derek , J. Mitchell , D. Pavlovic A derivation system for security protocols and its logical formalization , IEEE Computer Security Foundation Workshop , 2003]] A. Datta, A. Derek, J. Mitchell, D. Pavlovic A derivation system for security protocols and its logical formalization, IEEE Computer Security Foundation Workshop, 2003]]"},{"key":"e_1_3_2_1_10_1","volume-title":"RFC","author":"Dierks T.","year":"1999","unstructured":"T. Dierks , C. Allen The TLS protocol version 1.0 , RFC 2246, January 1999 ]] T. Dierks, C. Allen The TLS protocol version 1.0, RFC 2246, January 1999]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA459060"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5803.001.0001","volume-title":"Reasoning about knowledge","author":"Fagin R.","year":"1995","unstructured":"R. Fagin , J.Y. Halpern , Y. Moses , M.Y. Vardi . Reasoning about knowledge . MIT Press , 1995 ]] R. Fagin, J.Y. Halpern, Y. Moses, M.Y. Vardi. Reasoning about knowledge. MIT Press, 1995]]"},{"volume-title":"Proceedings of the 15th IEEE Computer Security Foundation Workshop","author":"Guttman J.D.","key":"e_1_3_2_1_13_1","unstructured":"J.D. Guttman . Security protocol design via authentication test , Proceedings of the 15th IEEE Computer Security Foundation Workshop , 2002]] J.D. Guttman. Security protocol design via authentication test, Proceedings of the 15th IEEE Computer Security Foundation Workshop, 2002]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(01)00139-6"},{"key":"e_1_3_2_1_15_1","first-page":"44","volume-title":"Proceedings of teh 5th International Conference on Dependable Computing for Critical Applications","author":"Gong L.","year":"1995","unstructured":"L. Gong , P. Syverson . Fail-stop protocols : An approavch to designing secure protocols , Proceedings of teh 5th International Conference on Dependable Computing for Critical Applications , 1995 , pp 44 -- 55 ]] L. Gong, P. Syverson. Fail-stop protocols: An approavch to designing secure protocols, Proceedings of teh 5th International Conference on Dependable Computing for Critical Applications, 1995, pp 44--55]]"},{"volume-title":"13th CSFW","author":"Heather J.","key":"e_1_3_2_1_16_1","unstructured":"J. Heather , G. Lowe , S. Schneider How to prevent type flaw attacks on security protocols , 13th CSFW , 2000]] J. Heather, G. Lowe, S. Schneider How to prevent type flaw attacks on security protocols, 13th CSFW, 2000]]"},{"key":"e_1_3_2_1_17_1","volume-title":"An introduction to modal logic","author":"Hughes G.E.","year":"1985","unstructured":"G.E. Hughes , M.J. Cresswell . An introduction to modal logic , Methuen, London and NewYork , 1985 ]] G.E. Hughes, M.J. Cresswell. An introduction to modal logic, Methuen, London and NewYork, 1985]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.757631"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(95)00144-2"},{"key":"e_1_3_2_1_20_1","volume-title":"Introduction and technical Reference","author":"Electronic Transactions L. Loeb Secure","year":"1998","unstructured":"L. Loeb Secure Electronic Transactions : Introduction and technical Reference , Artech House Pub ., 1998 ]] L. Loeb Secure Electronic Transactions: Introduction and technical Reference, Artech House Pub., 1998]]"},{"key":"e_1_3_2_1_21_1","first-page":"135","volume-title":"Formal verification of cryptographic protocols: A Survey","author":"Meadows C.","year":"1994","unstructured":"C. Meadows . Formal verification of cryptographic protocols: A Survey , pp 135 -- 150 , Asiacrypt 1994 ,]] C. Meadows. Formal verification of cryptographic protocols: A Survey, pp 135--150, Asiacrypt 1994,]]"},{"volume-title":"7th Usenix Security Symposium","author":"Mitchell J.","key":"e_1_3_2_1_22_1","unstructured":"J. Mitchell , V. Schmatikov , U. Stern Finite State Analysis of SSL 3.0 , 7th Usenix Security Symposium , 1998]] J. Mitchell, V. Schmatikov, U. Stern Finite State Analysis of SSL 3.0, 7th Usenix Security Symposium, 1998]]"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322530"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/794200.795149"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"P. Syverson. Towards a strand semantics for authentication logic Electronic Notes in Theoretical Computer Science 20 2000]] P. Syverson. Towards a strand semantics for authentication logic Electronic Notes in Theoretical Computer Science 20 2000]]","DOI":"10.1016\/S1571-0661(04)80072-0"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00125075"},{"volume-title":"Proceedings of the 1994 IEEE Symposium on Security and Privacy, 14--28]]","author":"Syverson P.","key":"e_1_3_2_1_27_1","unstructured":"P. Syverson , P.C. van Oorshot . On unifying some cryptographic protocols , Proceedings of the 1994 IEEE Symposium on Security and Privacy, 14--28]] P. Syverson, P.C. van Oorshot. On unifying some cryptographic protocols, Proceedings of the 1994 IEEE Symposium on Security and Privacy, 14--28]]"},{"volume-title":"Proceedings of the 12th IEEE Computer Security Foundation Workshop","author":"Song D.X.","key":"e_1_3_2_1_28_1","unstructured":"D.X. Song . Athena : a new efficient automated checker for security protocol analysis , Proceedings of the 12th IEEE Computer Security Foundation Workshop , 1999]] D.X. Song. Athena: a new efficient automated checker for security protocol analysis, Proceedings of the 12th IEEE Computer Security Foundation Workshop, 1999]]"},{"volume-title":"2nd Usenix workshop on electronic commerce","author":"Wagner D.","key":"e_1_3_2_1_29_1","unstructured":"D. Wagner , B. Schneier Analysisof the SSL 3.0 protocol , In 2nd Usenix workshop on electronic commerce , 1996]] D. Wagner, B. Schneier Analysisof the SSL 3.0 protocol, In 2nd Usenix workshop on electronic commerce, 1996]]"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 2004 ACM workshop on Formal methods in security engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029133.1029139","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029133.1029139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:07Z","timestamp":1750264267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029133.1029139"}},"subtitle":["a speech act-oriented approach"],"short-title":[],"issued":{"date-parts":[[2004,10,29]]},"references-count":29,"alternative-id":["10.1145\/1029133.1029139","10.1145\/1029133"],"URL":"https:\/\/doi.org\/10.1145\/1029133.1029139","relation":{},"subject":[],"published":{"date-parts":[[2004,10,29]]},"assertion":[{"value":"2004-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}