{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:45:39Z","timestamp":1772023539539,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csfw.2000.856932","type":"proceedings-article","created":{"date-parts":[[2002,11,7]],"date-time":"2002-11-07T22:31:28Z","timestamp":1036708288000},"page":"132-143","source":"Crossref","is-referenced-by-count":27,"title":["Towards automatic verification of authentication protocols on an unbounded network"],"prefix":"10.1109","author":[{"given":"J.","family":"Heather","sequence":"first","affiliation":[]},{"given":"S.","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596788"},{"key":"ref12","author":"roscoe","year":"1998","journal-title":"The Theory and Practice of Concurrency"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1998.683158"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/32.713329"},{"key":"ref15","author":"schneider","year":"1999","journal-title":"Concurrent and Real-Time Systems The CSP Approach"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1999.779773"},{"key":"ref17","author":"stoller","year":"2000","journal-title":"A bound on attacks on authentication protocols"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674832"},{"key":"ref4","author":"hoare","year":"1985","journal-title":"Communicating Sequential Processes"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2000.856932"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(95)00144-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF00197942"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-1992-1102","article-title":"Applying formal methods to the analysis of a key management protocol","volume":"1","author":"meadows","year":"1992","journal-title":"Journal of Computer Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1998.683159"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/74850.74852"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1995.398937"}],"event":{"name":"13th IEEE Computer Security Foundations Workshop","location":"Cambridge, UK","acronym":"CSFW-00"},"container-title":["Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6924\/18612\/00856932.pdf?arnumber=856932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,12]],"date-time":"2018-01-12T17:53:09Z","timestamp":1515779589000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/856932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/csfw.2000.856932","relation":{},"subject":[]}}