{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:37:30Z","timestamp":1729629450111,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/ecai.2014.7090214","type":"proceedings-article","created":{"date-parts":[[2015,4,24]],"date-time":"2015-04-24T21:08:09Z","timestamp":1429909689000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Secrecy by witness-functions on increasing protocols"],"prefix":"10.1109","author":[{"given":"Jaouhar","family":"Fattahi","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Mejri","sequence":"additional","affiliation":[]},{"given":"Hanane","family":"Houmani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/32.713329"},{"key":"ref11","first-page":"157","article-title":"Practical and universal interpretation functions for secrecy","author":"houmani","year":"2007","journal-title":"SECRYPT"},{"key":"ref12","first-page":"184","article-title":"Ensuring the correctness of cryptographic protocols with respect to secrecy","author":"houmani","year":"2008","journal-title":"SECRYPT"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/254942"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2008.11.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502680"},{"key":"ref16","first-page":"243","article-title":"Verifying security protocols: An application of csp","author":"schneider","year":"2004","journal-title":"25 Years Communicating Sequential Processes"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"317","DOI":"10.3233\/JCS-2005-13204","article-title":"A decision procedure for the existence of a rank function","volume":"13","author":"heather","year":"2005","journal-title":"J Comput Secur"},{"key":"ref18","first-page":"3","article-title":"Analysing the woo-lam protocol using csp and rank functions","author":"shaikh","year":"2005","journal-title":"WOSIS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1656242.1656244"},{"key":"ref4","article-title":"Introduction to the witness-functions for secrecy in cryptographic protocols(inpress)","author":"fattahi","year":"2014","journal-title":"The 2014 International Conference on Networks and Information"},{"key":"ref3","article-title":"A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols","author":"fattahi","year":"2014","journal-title":"ArXiv e-prints"},{"key":"ref6","first-page":"321","article-title":"An environment for the specification and analysis of cryptoprotocols","author":"mourad","year":"1998","journal-title":"ACSAC"},{"key":"ref5","first-page":"33","article-title":"Relaxed Conditions for Secrecy in a Role-Based specification","volume":"1","author":"fattahi","year":"2014","journal-title":"International Journal of Information Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.1997.630823"},{"key":"ref7","first-page":"50","article-title":"Formal automatic verification of authentication crytographic protocols","author":"debbabi","year":"1997","journal-title":"ICFEM"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2014.4728"},{"key":"ref1","first-page":"34","article-title":"Secrecy by witness functions","author":"fattahi","year":"2014","journal-title":"5th Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-010-9208-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.29"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-010-9187-9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-008-0059-4"},{"key":"ref23","first-page":"29","article-title":"Secure composition of protocols","author":"cortier","year":"2011","journal-title":"TOSCA"}],"event":{"name":"2014 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2014,10,23]]},"location":"Bucharest, Romania","end":{"date-parts":[[2014,10,25]]}},"container-title":["Proceedings of the 2014 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7083368\/7090132\/07090214.pdf?arnumber=7090214","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T22:47:05Z","timestamp":1566600425000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7090214\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ecai.2014.7090214","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}