{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T03:10:01Z","timestamp":1746414601611,"version":"3.40.4"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,10,10]],"date-time":"2014-10-10T00:00:00Z","timestamp":1412899200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/s13388-014-0015-3","type":"journal-article","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T10:55:17Z","timestamp":1412852117000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Belief manipulation and message meaning for protocol analysis"],"prefix":"10.1186","volume":"3","author":[{"given":"Aaron","family":"Hunter","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,10]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G Brassard","year":"1988","unstructured":"Brassard G, Chaum D, Crepeau C: Minimum disclosure proofs of knowledge. J. Comput. Syst. Sci 1988, 37: 156\u2013189. 10.1016\/0022-0000(88)90005-0","journal-title":"J. Comput. Syst. Sci"},{"issue":"12","key":"15_CR2","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R Needham","year":"1978","unstructured":"Needham R, Schroeder M: Using encryption for authentication in large networks of computers. Commun. ACM 1978, 21(12):993\u2013999. 10.1145\/359657.359659","journal-title":"Commun. ACM"},{"key":"15_CR3","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5803.001.0001","volume-title":"Reasoning About Knowledge","author":"R Fagin","year":"1995","unstructured":"Fagin R, Halpern J, Moses Y, Vardi M: Reasoning About Knowledge. MIT Press, Menlo Park, California; 1995."},{"key":"15_CR4","volume-title":"How To Do Things With Words","author":"J Austin","year":"1962","unstructured":"Austin J: How To Do Things With Words. Harvard University Press, Cambridge, Mass; 1962."},{"key":"15_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139173438","volume-title":"Speech Acts","author":"J Searle","year":"1969","unstructured":"Searle J: Speech Acts. Cambridge University Press, Cambridge, England; 1969."},{"key":"15_CR6","unstructured":"L Aiello, F Massacci, in Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, ed. by A Kakas, F Sadri, 1. Planning attacks to security protocols: case studies in logic programming, (2001)."},{"key":"15_CR7","first-page":"617","volume-title":"Automatic compilation of protocol insecurity problems into logic programming","author":"A Armando","year":"2004","unstructured":"A Armando, L Compagna, Y Lierler, in Proceedings of JELIA. Automatic compilation of protocol insecurity problems into logic programming, (2004), pp. 617\u2013627."},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R: A logic of authentication. ACM Trans. Comput. Syst 1990, 8(1):18\u201336. 10.1145\/77648.77649","journal-title":"ACM Trans. Comput. Syst"},{"key":"15_CR9","first-page":"427","volume-title":"Belief change and cryptographic protocol verification","author":"A Hunter","year":"2007","unstructured":"A Hunter, JP Delgrande, in Proceedings of AAAI. Belief change and cryptographic protocol verification, (2007), pp. 427\u2013433."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"J Halpern, R Pucella, On the relationship between strand spaces and multi-agent systems. CoRR. cs.CR\/0306107 (2003).","DOI":"10.1145\/605434.605436"},{"issue":"2\u20133","key":"15_CR11","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"J Thayer","year":"1999","unstructured":"Thayer J, Herzog J, Guttman J: Strand spaces: Proving security protocols correct. J. Comput. Secur 1999, 7(2\u20133):191\u2013230.","journal-title":"J. Comput. Secur"},{"key":"15_CR12","first-page":"1","volume-title":"The Scyther Tool: Verification, falsification, and analysis of security protocols","author":"C Cremers","year":"2008","unstructured":"C Cremers, in Computer Aided Verification, 20th International Conference. The Scyther Tool: Verification, falsification, and analysis of security protocols, (2008), pp. 1\u201330."},{"key":"15_CR13","first-page":"52","volume-title":"Protocol verification in a theory of action","author":"A Hunter","year":"2013","unstructured":"A Hunter, JP Delgrande, R McBride, in Proceedings of the Canadian Conference on Artificial Intelligence. Protocol verification in a theory of action, (2013), pp. 52\u201363."},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R: A logic of authentication. ACM Trans. Comput. Syst 1990, 8(1):18\u201336. 10.1145\/77648.77649","journal-title":"ACM Trans. Comput. Syst"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"P Syverson, P van Oorschot, A unified cryptographic protocol logic. Technical Report 5540\u2013227, Naval Research Lab (1996).","DOI":"10.21236\/ADA464967"},{"key":"15_CR16","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L Paulson","year":"1998","unstructured":"Paulson L: The inductive approach to verifying cryptographic protocols. J. Comput. Secur 1998, 6: 85\u2013128.","journal-title":"J. Comput. Secur"},{"issue":"4","key":"15_CR17","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1145\/383779.383785","volume":"2","author":"L Aiello","year":"2001","unstructured":"Aiello L, Massacci F: Verifying security protocols as planning in logic programming. ACM Trans. Comput. Logic 2001, 2(4):542\u2013580. 10.1145\/383779.383785","journal-title":"ACM Trans. Comput. Logic"},{"key":"15_CR18","first-page":"96","volume-title":"Events in security protocols","author":"F Crazzolara","year":"2001","unstructured":"F Crazzolara, G Winskel, in Proceedings of the 8th ACM Conference on Computer and Communication Security. Events in security protocols, (2001), pp. 96\u2013105."},{"issue":"2","key":"15_CR19","doi-asserted-by":"publisher","first-page":"510","DOI":"10.2307\/2274239","volume":"50","author":"C Alchourron","year":"1985","unstructured":"Alchourron C, Gardenfors P, Makinson D: On the logic of theory change: Partial meet functions for contraction and revision. J. Symbolic Logic 1985, 50(2):510\u2013530. 10.2307\/2274239","journal-title":"J. Symbolic Logic"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"H Katsuno, AO Mendelzon, in Belief Revision, ed. by P Gardenfors. On the difference between updating a knowledge base and revising it (Cambridge University Press, 1992), pp. 183\u2013203.","DOI":"10.1017\/CBO9780511526664.007"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/BF00247909","volume":"17","author":"A Grove","year":"1988","unstructured":"Grove A: Two modellings for theory change. J. Philos. Logic 1988, 17: 157\u2013170. 10.1007\/BF00247909","journal-title":"J. Philos. Logic"},{"key":"15_CR22","unstructured":"W Spohn, in Causation in Decision, Belief Change, and Statistics, 2. Ordinal conditional functions: a dynamic theory of epistemic states, (1988), pp. 105\u2013134."},{"issue":"3","key":"15_CR23","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1145\/116825.116852","volume":"38","author":"O Goldreich","year":"1991","unstructured":"Goldreich O, Micali S, Wigderson A: Proofs that yield nothing but their validity. J. ACM 1991, 38(3):690\u2013728. 10.1145\/116825.116852","journal-title":"J. ACM"},{"key":"15_CR24","volume-title":"Belief manipulation: a formal model of deceit in message passing systems","author":"A Hunter","year":"2013","unstructured":"A Hunter, in Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics. Belief manipulation: a formal model of deceit in message passing systems, (2013)."},{"key":"15_CR25","first-page":"509","volume-title":"COBA: A consistency-based belief revision system","author":"JP Delgrande","year":"2002","unstructured":"JP Delgrande, A Hunter, T Schaub, in Proceedings of the 8th European Conference on Logics in Artificial Intelligence (JELIA-02). COBA: A consistency-based belief revision system, (2002), pp. 509\u2013512."},{"key":"15_CR26","volume-title":"Dissecting the meaning of an encrypted message: An approach to discovering the goals of an adversary","author":"A Hunter","year":"2008","unstructured":"A Hunter, in Proceedings of the European Conference on Intelligence and Security Informatics. Dissecting the meaning of an encrypted message: An approach to discovering the goals of an adversary, (2008)."},{"issue":"2","key":"15_CR27","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s00145-001-0014-7","volume":"15","author":"M Abadi","year":"2002","unstructured":"Abadi M, Rogaway P: Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology 2002, 15(2):103\u2013127.","journal-title":"J. Cryptology"},{"issue":"16","key":"15_CR28","first-page":"1","volume":"3","author":"M Gelfond","year":"1998","unstructured":"Gelfond M, Lifschitz V: Action languages. Linkoping Electron. Articles Comput. Inf. Sci 1998, 3(16):1\u201316.","journal-title":"Articles Comput. Inf. Sci"},{"key":"15_CR29","volume-title":"Belief revision and trust","author":"A Hunter","year":"2014","unstructured":"A Hunter, in Proceedings of the International Workshop on Nonmonotonic Reasoning. Belief revision and trust, (2014)."},{"issue":"3","key":"15_CR30","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P McDaniel","year":"2009","unstructured":"McDaniel P, McLaughlin S: Security and privacy challenges in the smart grid. Secur. Privacy 2009, 7(3):75\u201377. 10.1109\/MSP.2009.76","journal-title":"Secur. Privacy"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-014-0015-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0015-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0015-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0015-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T02:44:36Z","timestamp":1746413076000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/s13388-014-0015-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,10]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["15"],"URL":"https:\/\/doi.org\/10.1186\/s13388-014-0015-3","relation":{},"ISSN":["2190-8532"],"issn-type":[{"type":"electronic","value":"2190-8532"}],"subject":[],"published":{"date-parts":[[2014,10,10]]},"assertion":[{"value":"17 January 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"15"}}