{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:07:29Z","timestamp":1725894449443},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368295"},{"type":"electronic","value":"9783642368301"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36830-1_5","type":"book-chapter","created":{"date-parts":[[2013,2,18]],"date-time":"2013-02-18T19:35:47Z","timestamp":1361216147000},"page":"83-104","source":"Crossref","is-referenced-by-count":4,"title":["Sound Security Protocol Transformations"],"prefix":"10.1007","author":[{"given":"Binh Thanh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Sprenger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Arapinis, M.: S\u00e9curit\u00e9 des protocoles cryptographiques: d\u00e9cidabilit\u00e9 et r\u00e9sultats de r\u00e9duction. PhD thesis, Universit\u00e9 Paris-Est (November 2008)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-540-77050-3_31","volume-title":"FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science","author":"M. Arapinis","year":"2007","unstructured":"Arapinis, M., Duflot, M.: Bounding Messages for Free in Security\u00a0Protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol.\u00a04855, pp. 376\u2013387. Springer, Heidelberg (2007)"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10207-007-0041-y","volume":"7","author":"A. Armando","year":"2008","unstructured":"Armando, A., Compagna, L.: SAT-based model-checking for security protocols analysis. International Journal of Information Security\u00a07(1), 3\u201332 (2008)","journal-title":"International Journal of Information Security"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Bieber, P., Boulahia-Cuppens, N.: Formal development of authentication protocols. In: Sixth BCS-FACS Refinement Workshop (1994)","DOI":"10.1007\/978-1-4471-3240-0_5"},{"key":"5_CR5","unstructured":"Cervesato, I., Meadows, C., Pavlovic, D.: An encapsulated authentication logic for reasoning about key distribution protocols. In: CSFW 2005: Proceedings of the 18th IEEE Workshop on Computer Security Foundations, Washington, DC, USA, pp. 48\u201361 (2005)"},{"key":"5_CR6","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: Abstraction and refinement in protocol derivation. In: Proc. 17th IEEE Computer Security Foundations Workshop, CSFW (2004)"},{"key":"5_CR7","doi-asserted-by":"crossref","first-page":"423","DOI":"10.3233\/JCS-2005-13304","volume":"13","author":"A. Datta","year":"2005","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositionl logic for security protocols. Journal of Computer Security\u00a013, 423\u2013482 (2005)","journal-title":"Journal of Computer Security"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-642-03459-6_8","volume-title":"Foundations and Applications of Security Analysis","author":"J.D. Guttman","year":"2009","unstructured":"Guttman, J.D.: Transformations between Cryptographic Protocols. In: Degano, P., Vigan\u00f2, L. (eds.) ARSPA-WITS 2009. LNCS, vol.\u00a05511, pp. 107\u2013123. Springer, Heidelberg (2009)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-642-27375-9_8","volume-title":"Theory of Security and Applications","author":"J.D. Guttman","year":"2012","unstructured":"Guttman, J.D.: Security Goals and Protocol Transformations. In: M\u00f6dersheim, S., Palamidessi, C. (eds.) TOSCA 2011. LNCS, vol.\u00a06993, pp. 130\u2013147. Springer, Heidelberg (2012)"},{"issue":"2","key":"5_CR10","doi-asserted-by":"crossref","first-page":"217","DOI":"10.3233\/JCS-2003-11204","volume":"11","author":"J. Heather","year":"2003","unstructured":"Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols. Journal of Computer Security\u00a011(2), 217\u2013244 (2003)","journal-title":"Journal of Computer Security"},{"issue":"1\/2","key":"5_CR11","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/JCS-2001-91-202","volume":"9","author":"M.L. Hui","year":"2001","unstructured":"Hui, M.L., Lowe, G.: Fault-preserving simplifying transformations for security protocols. Journal of Computer Security\u00a09(1\/2), 3\u201346 (2001)","journal-title":"Journal of Computer Security"},{"key":"5_CR12","unstructured":"Li, Y., Yang, W., Huang, C.-W.: Preventing type flaw attacks on security protocols with a simplified tagging scheme. In: Waldron, J. (ed.) ISICT. ACM International Conference Proceeding Series, vol.\u00a090, pp. 244\u2013249. Trinity College Dublin (2004)"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-61770-1_46","volume-title":"Computer Security - ESORICS 96","author":"C.A. Meadows","year":"1996","unstructured":"Meadows, C.A.: Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. In: Bertino, E., Kurth, H., Martella, G., Montolivo, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 351\u2013364. Springer, Heidelberg (1996)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Meier, S., Cremers, C.J.F., Basin, D.A.: Strong invariants for the efficient construction of machine-checked protocol security proofs. In: Proc. 23th IEEE Computer Security Foundations Symposium, CSF, pp. 231\u2013245 (2010)","DOI":"10.1109\/CSF.2010.23"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Nguyen, B.T., Sprenger, C.: Sound security protocol transformations. Technical Report 781, Department of Computer Science, ETH Zurich (2012)","DOI":"10.1007\/978-3-642-36830-1_5"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/11863908_24","volume-title":"Computer Security \u2013 ESORICS 2006","author":"D. Pavlovic","year":"2006","unstructured":"Pavlovic, D., Meadows, C.: Deriving Secrecy in Key Establishment Protocols. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 384\u2013403. Springer, Heidelberg (2006)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Sprenger, C., Basin, D.: Refining key establishment. In: Proc. 25th IEEE Computer Security Foundations Symposium, CSF, pp. 230\u2013246 (2012)","DOI":"10.1109\/CSF.2012.21"}],"container-title":["Lecture Notes in Computer Science","Principles of Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36830-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T22:07:34Z","timestamp":1644358054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36830-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368295","9783642368301"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36830-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}