{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:17:32Z","timestamp":1762460252902,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T00:00:00Z","timestamp":1566086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100008433","name":"Comunidad de Madrid","doi-asserted-by":"publisher","award":["S2018\/TCS-4339"],"award-info":[{"award-number":["S2018\/TCS-4339"]}],"id":[{"id":"10.13039\/501100008433","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministerio de Ciencia e Innovaci\u00f3n","award":["PRX18\/00625"],"award-info":[{"award-number":["PRX18\/00625"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,18]]},"DOI":"10.1145\/3331542.3342573","type":"proceedings-article","created":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T20:51:45Z","timestamp":1564433505000},"page":"56-67","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Gaining trust by tracing security protocols"],"prefix":"10.1145","author":[{"given":"Lars-\u00c5ke","family":"Fredlund","sequence":"first","affiliation":[{"name":"Universidad Polit\u00e9cnica de Madrid, Spain"}]},{"given":"Clara","family":"Benac Earle","sequence":"additional","affiliation":[{"name":"Universidad Polit\u00e9cnica de Madrid, Spain"}]},{"given":"Thomas","family":"Arts","sequence":"additional","affiliation":[{"name":"Quviq, Sweden"}]},{"given":"Hans","family":"Svensson","sequence":"additional","affiliation":[{"name":"Quviq, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2019,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Jesper Louis Andersen. 2015. Enacl \u2013 Erlang bindings for NaCl\/libsodium. https:\/\/github.com\/jlouis\/enacl  Jesper Louis Andersen. 2015. Enacl \u2013 Erlang bindings for NaCl\/libsodium. https:\/\/github.com\/jlouis\/enacl"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/636517.636524"},{"key":"e_1_3_2_1_3_1","volume-title":"RV 2016, Madrid, Spain, September 23-30, 2016, Proceedings (Lecture Notes in Computer Science) , Yli\u00e8s Falcone and C\u00e9sar S\u00e1nchez (Eds.)","volume":"10012","author":"Attard Duncan Paul","year":"2016"},{"key":"e_1_3_2_1_4_1","volume-title":"SEFM 2017, Trento, Italy, September 4-8, 2017, Proceedings (Lecture Notes in Computer Science) , Alessandro Cimatti and Marjan Sirjani (Eds.)","volume":"10469","author":"Attard Duncan Paul","year":"2017"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1561\/3300000004"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33693-0_12"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129511000211"},{"key":"e_1_3_2_1_8_1","volume-title":"19th International Colloquium, ICALP92","volume":"623","author":"Degano Pierpaolo","year":"1992"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_11_1","unstructured":"Jason A. Donenfeld. 2018. WireGuard \u2013 fast modern secure VPN tunnel. https:\/\/www.wireguard.com\/  Jason A. Donenfeld. 2018. WireGuard \u2013 fast modern secure VPN tunnel. https:\/\/www.wireguard.com\/"},{"key":"e_1_3_2_1_12_1","unstructured":"Frank Denis et. al. 2013. Sodium \u2013 a new easy-to-use software library for encryption decryption signatures password hashing and more. https:\/\/libsodium.gitbook.io\/doc\/  Frank Denis et. al. 2013. Sodium \u2013 a new easy-to-use software library for encryption decryption signatures password hashing and more. https:\/\/libsodium.gitbook.io\/doc\/"},{"key":"e_1_3_2_1_13_1","unstructured":"Yanislav Malahov et. al. 2018. The \u00e6ternity blockchain. https: \/\/aeternity.com  Yanislav Malahov et. al. 2018. The \u00e6ternity blockchain. https: \/\/aeternity.com"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-014-0217-9"},{"key":"e_1_3_2_1_15_1","unstructured":"Guillaume Girol. 2019. Formalizing and Verifying the Security Protocols from the Noise Framework . Master\u2019s thesis. ETH Z\u00fcrich Switzerland.  Guillaume Girol. 2019. Formalizing and Verifying the Security Protocols from the Noise Framework . Master\u2019s thesis. ETH Z\u00fcrich Switzerland."},{"key":"e_1_3_2_1_16_1","volume-title":"Santiago","volume":"7533","author":"Hevia Alejandro","year":"2012"},{"key":"e_1_3_2_1_17_1","first-page":"766","article-title":"Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols","volume":"2018","author":"Kobeissi Nadim","year":"2018","journal-title":"IACR Cryptology ePrint Archive"},{"volume":"8044","volume-title":"CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings (Lecture Notes in Computer Science) , Natasha Sharygina and Helmut Veith (Eds.)","author":"Meier Simon","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"Trevor Perrin. 2016. The Noise Protocol Framework. http:\/\/ noiseprotocol.org\/noise.html  Trevor Perrin. 2016. The Noise Protocol Framework. http:\/\/ noiseprotocol.org\/noise.html"},{"key":"e_1_3_2_1_20_1","unstructured":"Gordon D. Plotkin. 1981. A Structural Approach to Operational Semantics. Aarhus University report DAIMI FN-19 (1981).  Gordon D. Plotkin. 1981. A Structural Approach to Operational Semantics. Aarhus University report DAIMI FN-19 (1981)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_22_1","unstructured":"Andris Suter-D\u00f6rig. 2018. Formalizing and Verifying the Security Protocols from the Noise Framework.  Andris Suter-D\u00f6rig. 2018. Formalizing and Verifying the Security Protocols from the Noise Framework."},{"key":"e_1_3_2_1_23_1","unstructured":"Hans Svensson. 2005. Verification of Erlang Programs using Testing and Tracing.  Hans Svensson. 2005. Verification of Erlang Programs using Testing and Tracing."},{"key":"e_1_3_2_1_24_1","unstructured":"Hans Svensson. 2018. Enoise \u2013 An Erlang implementation of the Noise protocol. https:\/\/github.com\/aeternity\/enoise  Hans Svensson. 2018. Enoise \u2013 An Erlang implementation of the Noise protocol. https:\/\/github.com\/aeternity\/enoise"},{"key":"e_1_3_2_1_25_1","unstructured":"Rhys Weatherley. 2016. Noise-C a plain C implementation of the Noise protocol. https:\/\/github.com\/rweather\/noise-c  Rhys Weatherley. 2016. Noise-C a plain C implementation of the Noise protocol. https:\/\/github.com\/rweather\/noise-c"},{"key":"e_1_3_2_1_26_1","unstructured":"Wikipedia. 2012. The HKDF key derivation function. https:\/\/en. wikipedia.org\/wiki\/HKDF  Wikipedia. 2012. The HKDF key derivation function. https:\/\/en. wikipedia.org\/wiki\/HKDF"}],"event":{"name":"ICFP '19: ACM SIGPLAN International Conference on Functional Programming","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Berlin Germany","acronym":"ICFP '19"},"container-title":["Proceedings of the 18th ACM SIGPLAN International Workshop on Erlang"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3331542.3342573","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3331542.3342573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:38Z","timestamp":1750202018000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3331542.3342573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,18]]},"references-count":26,"alternative-id":["10.1145\/3331542.3342573","10.1145\/3331542"],"URL":"https:\/\/doi.org\/10.1145\/3331542.3342573","relation":{},"subject":[],"published":{"date-parts":[[2019,8,18]]},"assertion":[{"value":"2019-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}