{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:16Z","timestamp":1750220056216,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T00:00:00Z","timestamp":1677110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,23]]},"DOI":"10.1145\/3587828.3587859","type":"proceedings-article","created":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T15:40:57Z","timestamp":1687275657000},"page":"206-211","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A way to find counterexamples located at deep positions with domain knowledge of authentication protocols"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7108-0551","authenticated-orcid":false,"given":"Naomi","family":"Okumura","sequence":"first","affiliation":[{"name":"School of Information Science, Japan Advanced Institute of Science and Technology, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4441-3259","authenticated-orcid":false,"given":"Kazuhiro","family":"Ogata","sequence":"additional","affiliation":[{"name":"School of Information Science, Japan Advanced Institute of Science and Technology, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"131","volume":"199","author":"Lowe G.","unstructured":"G. Lowe . An Attack on the Needham\u2212Schroeder Public\u2212Key Authentication Protocol .\u00a0 I Inf Process Lett 199 5;56(3): 131 \u2013 133 . G. Lowe. An Attack on the Needham\u2212Schroeder Public\u2212Key Authentication Protocol.\u00a0I Inf Process Lett 1995;56(3):131\u20133.","journal-title":"I Inf Process Lett"},{"key":"e_1_3_2_1_2_1","first-page":"993","volume":"197","author":"Needham R. M.","unstructured":"R. M. Needham , Using encryption for authentication in large networks of computers.\u00a0 Commun. ACM 197 8;21(12): 993 \u2013 999 . R. M. Needham, Using encryption for authentication in large networks of computers.\u00a0Commun. ACM 1978;21(12):993\u20139.","journal-title":"Commun. ACM"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"E. M. Clarke Automatic verification of finite-state concurrent systems using temporal logic specifications.\u00a0ACM TOPLAS\u00a01986;8(2):244-263.  E. M. Clarke Automatic verification of finite-state concurrent systems using temporal logic specifications.\u00a0ACM TOPLAS\u00a01986;8(2):244-263.","DOI":"10.1145\/5397.5399"},{"key":"e_1_3_2_1_4_1","first-page":"105","volume":"199","author":"Emerson E. A.","unstructured":"E. A. Emerson , Symmetry and model checking. Formal Methods in System Design 199 6;9(1): 105 - 131 . E. A. Emerson, Symmetry and model checking. Formal Methods in System Design 1996;9(1):105-131.","journal-title":"System Design"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"A.\n      Biere Symbolic model checking without BDDs. TACAS LNCS 1579.\n  1999\n  :\n  193\n  -\n  207\n  .  A. Biere Symbolic model checking without BDDs. TACAS LNCS 1579. 1999:193-207.","DOI":"10.1007\/3-540-49059-0_14"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"N. Okumura Formal analysis of RFC 8120 authentication protocol for HTTP under different assumptions. Journal of Information Security and Applications\u00a02020;53:102529.  N. Okumura Formal analysis of RFC 8120 authentication protocol for HTTP under different assumptions. Journal of Information Security and Applications\u00a02020;53:102529.","DOI":"10.1016\/j.jisa.2020.102529"},{"key":"e_1_3_2_1_7_1","volume-title":"Req. for Comments (RFC): 8120, Categ.: Exp.","author":"Oiwa Y.","year":"2070","unstructured":"Y. Oiwa , Mutual Authentication Protocol for HTTP. IETF , Req. for Comments (RFC): 8120, Categ.: Exp. ( ISSN : 2070 -1721). Y. Oiwa, Mutual Authentication Protocol for HTTP. IETF, Req. for Comments (RFC): 8120, Categ.: Exp. (ISSN: 2070-1721)."},{"key":"e_1_3_2_1_8_1","volume-title":"Req. for Comments (RFC): 8121, Categ.: Exp.","author":"Oiwa Y.","year":"2070","unstructured":"Y. Oiwa , Mutual authentication protocol for HTTP: cryptographic algorithms based on the key agreement mechanism 3 (KAM3). IETF , Req. for Comments (RFC): 8121, Categ.: Exp. ( ISSN : 2070 -1721). Y. Oiwa, Mutual authentication protocol for HTTP: cryptographic algorithms based on the key agreement mechanism 3 (KAM3). IETF, Req. for Comments (RFC): 8121, Categ.: Exp. (ISSN: 2070-1721)."},{"key":"e_1_3_2_1_9_1","volume-title":"All about maude. LNCS, 4350","author":"Clavel M.","year":"2007","unstructured":"M. Clavel , All about maude. LNCS, 4350 . 2007 . M. Clavel, All about maude. LNCS, 4350. 2007."}],"event":{"name":"ICSCA 2023: 2023 12th International Conference on Software and Computer Applications","acronym":"ICSCA 2023","location":"Kuantan Malaysia"},"container-title":["Proceedings of the 2023 12th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587828.3587859","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587828.3587859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:28Z","timestamp":1750183708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587828.3587859"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,23]]},"references-count":9,"alternative-id":["10.1145\/3587828.3587859","10.1145\/3587828"],"URL":"https:\/\/doi.org\/10.1145\/3587828.3587859","relation":{},"subject":[],"published":{"date-parts":[[2023,2,23]]},"assertion":[{"value":"2023-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}