{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:01Z","timestamp":1750221121867,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:00:00Z","timestamp":1550534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,19]]},"DOI":"10.1145\/3316615.3316629","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"363-368","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Verification of Verifiability of Voting Protocols by Strand Space Analysis"],"prefix":"10.1145","author":[{"given":"Shigeki","family":"Hagihara","sequence":"first","affiliation":[{"name":"Tohoku University of Community Service and Science, Yamagata, Japan"}]},{"given":"Masaya","family":"Shimakawa","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology, Tokyo, Japan"}]},{"given":"Naoki","family":"Yonezaki","sequence":"additional","affiliation":[{"name":"Tokyo Denki University, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2019,2,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/373243.360213"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266432"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324249.1324261"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/74850.74852"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.02.012"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/353594.353603"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647091.713943"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103576.1103585"},{"key":"e_1_3_2_1_9_1","first-page":"4","article-title":"Authenticity by typing for security protocols","volume":"11","author":"Gordon A. D.","year":"2003","unstructured":"Gordon , A. D. , and Jeffrey , A . Authenticity by typing for security protocols . J. Comput. Secur. 11 , 4 ( 2003 ), 451--519. Gordon, A. D., and Jeffrey, A. Authenticity by typing for security protocols. J. Comput. Secur. 11, 4 (2003), 451--519.","journal-title":"J. Comput. Secur."},{"key":"e_1_3_2_1_10_1","series-title":"Proceedings in Information and Communications Technology","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/978-4-431-54106-6_10","volume-title":"Theory and Practice of Computation","author":"Hagihara S.","year":"2012","unstructured":"Hagihara , S. , Oguro , H. , and Yonezaki , N . Completeness of a deduction system for relational information between ciphertexts based on probabilistic computational semantics . In Theory and Practice of Computation ( 2012 ), vol. 5 of Proceedings in Information and Communications Technology , Springer , pp. 116 -- 132 . Hagihara, S., Oguro, H., and Yonezaki, N. Completeness of a deduction system for relational information between ciphertexts based on probabilistic computational semantics. In Theory and Practice of Computation (2012), vol. 5 of Proceedings in Information and Communications Technology, Springer, pp. 116--132."},{"key":"e_1_3_2_1_11_1","first-page":"2","article-title":"Kripke semantics for epistemic logic of relational information between ciphertexts","volume":"7","author":"Hagihara S.","year":"2012","unstructured":"Hagihara , S. , Oguro , H. , and Yonezaki , N . Kripke semantics for epistemic logic of relational information between ciphertexts . Philippine Computing Journal 7 , 2 ( 2012 ), 23--32. Hagihara, S., Oguro, H., and Yonezaki, N. Kripke semantics for epistemic logic of relational information between ciphertexts. Philippine Computing Journal 7, 2 (2012), 23--32.","journal-title":"Philippine Computing Journal"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 16th Philippine Computing Science Congress","author":"Hagihara S.","year":"2016","unstructured":"Hagihara , S. , Sato , N. , and Yonezaki , N . Towards a synthesis of security protocols for data transmission . In Proceedings of the 16th Philippine Computing Science Congress ( 2016 ). Hagihara, S., Sato, N., and Yonezaki, N. Towards a synthesis of security protocols for data transmission. In Proceedings of the 16th Philippine Computing Science Congress (2016)."},{"key":"e_1_3_2_1_13_1","first-page":"299","volume-title":"Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems (2003), ISSS'02, Springer-Verlag","author":"Hagiya M.","unstructured":"Hagiya , M. , Takemura , R. , Takahashi , K. , and Saito , T . Verification of authentication protocols based on the binding relation . In Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems (2003), ISSS'02, Springer-Verlag , pp. 299 -- 316 . Hagiya, M., Takemura, R., Takahashi, K., and Saito, T. Verification of authentication protocols based on the binding relation. In Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems (2003), ISSS'02, Springer-Verlag, pp. 299--316."},{"key":"e_1_3_2_1_14_1","volume-title":"Implementation and verification of authentication protocols using proof procedures in HOL.In 2nd IMC Enterprise Security Workshop (November","author":"Hagiya M.","year":"1999","unstructured":"Hagiya , M. , Toda , Y. , and Fukuda , Y . Implementation and verification of authentication protocols using proof procedures in HOL.In 2nd IMC Enterprise Security Workshop (November 1999 ), Information Media Center, Science University of Tokyo . http:\/\/nicosia.is.s.u-tokyo.ac.jp\/pub\/staff\/hagiya\/ssr99\/protoveri.ps. Hagiya, M., Toda, Y., and Fukuda, Y. Implementation and verification of authentication protocols using proof procedures in HOL.In 2nd IMC Enterprise Security Workshop (November 1999), Information Media Center, Science University of Tokyo. http:\/\/nicosia.is.s.u-tokyo.ac.jp\/pub\/staff\/hagiya\/ssr99\/protoveri.ps."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212706"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/646480.693776"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/794197.795075"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exq013"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(95)00095-X"},{"key":"e_1_3_2_1_20_1","volume-title":"Formal framework and evaluation method for denial of service","author":"Meadows C.","year":"1999","unstructured":"Meadows , C. Formal framework and evaluation method for denial of service , 1999 . Meadows, C. Formal framework and evaluation method for denial of service, 1999."},{"key":"e_1_3_2_1_21_1","first-page":"109","volume-title":"International Workshop on Formal Methods and Computer Security","author":"Negishi K.","year":"2000","unstructured":"Negishi , K. , and Yonezaki , N . Verification method for possibility of parallel attack on multiple sessions with the same principals in a security protocol . In International Workshop on Formal Methods and Computer Security ( 2000 ), pp. 109 -- 120 . Negishi, K., and Yonezaki, N. Verification method for possibility of parallel attack on multiple sessions with the same principals in a security protocol. In International Workshop on Formal Methods and Computer Security (2000), pp. 109--120."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/353677.353681"},{"key":"e_1_3_2_1_23_1","volume-title":"Modelling & Analysis of Security Protocols","author":"Ryan P.","year":"2000","unstructured":"Ryan , P. , Schneider , S. , Goldsmith , M. , Lowe , G. , and Roscoe , B . Modelling & Analysis of Security Protocols . Addison-Wesley Professional , 2000 . Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., and Roscoe, B. Modelling & Analysis of Security Protocols. Addison-Wesley Professional, 2000."},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"a novel approach to efficient automatic security protocol analysis","volume":"9","author":"Berezin D.","year":"2001","unstructured":"S. Berezin , D. , and A. Perrig . Athena : a novel approach to efficient automatic security protocol analysis . Journal of Computer Security 9 , 1 ( 2001 ), 47--74. S.Berezin, D., and A.Perrig. Athena: a novel approach to efficient automatic security protocol analysis. Journal of Computer Security 9, 1 (2001), 47--74.","journal-title":"Journal of Computer Security"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54525-2_37"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_27"},{"key":"e_1_3_2_1_27_1","first-page":"25","volume-title":"Second Mext-NSF-JSPS International Symposium, ISSS 2003","author":"Tomioka D.","year":"2003","unstructured":"Tomioka , D. , Nishizaki , S. , and Ikeda , R . A cost estimation calculus for analyzing the resistance to denial-of-service attack. In Software Security - Theories and Systems , Second Mext-NSF-JSPS International Symposium, ISSS 2003 , Tokyo, Japan , November 4-6, 2003 , Revised Papers (2003), pp. 25 -- 44 . Tomioka, D., Nishizaki, S., and Ikeda, R. A cost estimation calculus for analyzing the resistance to denial-of-service attack. In Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers (2003), pp. 25--44."}],"event":{"name":"ICSCA '19: 2019 8th International Conference on Software and Computer Applications","sponsor":["University of New Brunswick University of New Brunswick"],"location":"Penang Malaysia","acronym":"ICSCA '19"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316629","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316615.3316629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:11Z","timestamp":1750208531000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,19]]},"references-count":27,"alternative-id":["10.1145\/3316615.3316629","10.1145\/3316615"],"URL":"https:\/\/doi.org\/10.1145\/3316615.3316629","relation":{},"subject":[],"published":{"date-parts":[[2019,2,19]]},"assertion":[{"value":"2019-02-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}