{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:01:52Z","timestamp":1725544912309},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540326281"},{"type":"electronic","value":"9783540326298"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11679219_4","type":"book-chapter","created":{"date-parts":[[2006,2,23]],"date-time":"2006-02-23T02:36:41Z","timestamp":1140662201000},"page":"34-46","source":"Crossref","is-referenced-by-count":2,"title":["A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols"],"prefix":"10.1007","author":[{"given":"Rob","family":"Delicata","sequence":"first","affiliation":[]},{"given":"Steve","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-540-27836-8_7","volume-title":"Automata, Languages and Programming","author":"M. Abadi","year":"2004","unstructured":"[AC04] Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. In: D\u00edaz, J., Karhum\u00e4ki, J., Lepist\u00f6, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol.\u00a03142, pp. 46\u201358. Springer, Heidelberg (2004)"},{"key":"4_CR2","volume-title":"Proceedings of the 5th ACM Conference on Computer and Communication Security","author":"G. Ateniese","year":"2000","unstructured":"[AST00] Ateniese, G., Steiner, M., Tsudik, G.: Authenticated group key agreement and friends. In: Proceedings of the 5th ACM Conference on Computer and Communication Security. ACM Press, New York (2000)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-45682-1_18","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"E. Bresson","year":"2001","unstructured":"[BCP01] Bresson, E., Chevassut, O., Pointcheval, D.: Provably authenticated group diffie-hellman key exchange - the dynamic case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, p. 290. Springer, Heidelberg (2001)"},{"key":"4_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C. Boyd","year":"2003","unstructured":"[BM03] Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003)"},{"key":"4_CR5","unstructured":"[BR02] Broadfoot, P., Roscoe, A.W.: Internalising agents in CSP protocol models. In: Workshop on Issues in the Theory of Security: WITS 2002 (2002)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"[DH76] Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6) (1976)","DOI":"10.1109\/TIT.1976.1055638"},{"key":"4_CR7","volume-title":"Proceedings of the 18th Computer Security Foundations Workshop: CSFW-18","author":"R. Delicata","year":"2005","unstructured":"[DS05]Delicata, R., Schneider, S.: Temporal rank functions for forward secrecy. In: Proceedings of the 18th Computer Security Foundations Workshop: CSFW-18. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"4_CR8","unstructured":"[Hea01] Heather, J.: Oh! Is it really you? using rank functions to verify authentication protocols. Ph.D Thesis, Royal Holloway, University of London (2001)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"M. Just","year":"1996","unstructured":"[JV96] Just, M., Vaudenay, S.: Authenticated multi-party key agreement. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163, Springer, Heidelberg (1996)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"[Mea00] Meadows, C.: Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives. In: Workshop on Issues in the Theory of Security: WITS 2000 (2000)","DOI":"10.21236\/ADA464085"},{"key":"4_CR11","unstructured":"[MTI86] Matsumoto, T., Takashima, Y., Imai, H.: On seeking smart public-key-distribution systems. Transactions of the IECE of Japan\u00a0E69(2) (1986)"},{"key":"4_CR12","volume-title":"Proceedings of the 14th IEEE Computer Security Foundations Workshop: CSFW-14","author":"O. Pereira","year":"2001","unstructured":"[PQ01]Pereira, O., Quisquater, J.-J.: Security analysis of the Cliques protocols suites. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop: CSFW-14. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"4_CR13","volume-title":"Proceedings of The 10th Computer Security Foundations Workshop: CSFW-10","author":"S. Schneider","year":"1997","unstructured":"[Sch97]Schneider, S.: Verifying authentication protocols with CSP. In: Proceedings of The 10th Computer Security Foundations Workshop: CSFW-10. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"4_CR14","volume-title":"Concurrent and Real-time Systems: The CSP Approach","author":"S. Schneider","year":"2000","unstructured":"[Sch00]Schneider, S.: Concurrent and Real-time Systems: The CSP Approach. John Wiley and Sons, Ltd, Chichester (2000)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"[THG99] F\u00e1brega, F.J.T., Herzog, J., Guttman, J.: Strand spaces: Proving security protocols correct. Journal of Computer Security\u00a07(2\/3) (1999)","DOI":"10.3233\/JCS-1999-72-304"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11679219_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T22:06:48Z","timestamp":1555452408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11679219_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540326281","9783540326298"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11679219_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}