{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T04:11:04Z","timestamp":1754194264243,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE Comput. Soc. Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csfw.1997.596802","type":"proceedings-article","created":{"date-parts":[[2002,11,22]],"date-time":"2002-11-22T20:23:27Z","timestamp":1037996607000},"page":"133-146","source":"Crossref","is-referenced-by-count":38,"title":["Towards the formal verification of electronic commerce protocols"],"prefix":"10.1109","author":[{"given":"D.","family":"Bolignano","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"On the formal specification and verification of a multiparty session protocol","author":"chen","year":"1990","journal-title":"Proc IEEE Symposium on Research in Security and Privacy"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"journal-title":"The coq proof assistant user guide","year":"1993","author":"dowek","key":"ref12"},{"journal-title":"Automata Languages and Machines (Vol A)","year":"1974","author":"eilenberg","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1145\/3592626.3592675","article-title":"The millicent protocol for inexpensive electronic commerce","author":"glassman","year":"1995","journal-title":"Fourth International World Wide Web Conference Dec 1995"},{"key":"ref15","article-title":"Specification and verification of a ttp protocol for the conditional access to services","author":"leduc","year":"1996","journal-title":"Proceedings of the 12th Workshop on the Application of Formal Methods to System Development (Univ Montreal)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/32.502224"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/49.17707"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(95)00144-2"},{"year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3240-0_5"},{"key":"ref3","article-title":"ikp - a family of secure electronic payment protocols","author":"bellare","year":"1995","journal-title":"Proc First USENIX Workshop on Electronic Commerce"},{"key":"ref6","article-title":"Formal verification of cryptographic protocols","author":"bolignano","year":"1996","journal-title":"Proceedings of the Third ACM Conference on Computer and Communication Security"},{"key":"ref5","article-title":"Verification formelle de protocoles cryptographiques \ufffd l'aide de Coq","author":"bolignano","year":"1995","journal-title":"Actes des journ\ufffdes GDR"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"ref7","article-title":"Towards the Mechanization of Cryptographic Protocol Verification","author":"bolignano","year":"1997","journal-title":"Proceedings of the 9th International Conference on Computer-Aided Verification (CAV'97)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1142\/9781848161023_0001"},{"journal-title":"C-set architecture de s\ufffdcurit\ufffd","year":"1996","author":"cb","key":"ref9"},{"key":"ref1","article-title":"The B-method for large software specification, design and coding","author":"abrial","year":"1991","journal-title":"VDM'91"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-1992-1102","article-title":"Applying formal methods to the analysis of a key management protocol","author":"meadows","year":"1992","journal-title":"Journal of Computer Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596788"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/TSE.1987.233151","article-title":"the interrogator: protocol secuity analysis","volume":"se 13","author":"millen","year":"1987","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1995.518556"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(96)00076-1"},{"journal-title":"Formal methods for the analysis of authentication protocols","year":"1993","author":"rubin","key":"ref25"}],"event":{"name":"10th Computer Security Foundations Workshop","acronym":"CSFW-97","location":"Rockport, MA, USA"},"container-title":["Proceedings 10th Computer Security Foundations Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx3\/4668\/13078\/00596802.pdf?arnumber=596802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:55:51Z","timestamp":1704675351000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/596802\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/csfw.1997.596802","relation":{},"subject":[]}}