{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T03:37:52Z","timestamp":1648611472323},"reference-count":28,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2014,11,20]],"date-time":"2014-11-20T00:00:00Z","timestamp":1416441600000},"content-version":"vor","delay-in-days":4341,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2003,1]]},"DOI":"10.1016\/s1571-0661(04)00244-0","type":"journal-article","created":{"date-parts":[[2004,1,29]],"date-time":"2004-01-29T10:14:39Z","timestamp":1075371279000},"page":"51-68","source":"Crossref","is-referenced-by-count":0,"title":["Attacking Fair-Exchange Protocols"],"prefix":"10.1016","volume":"55","author":[{"given":"Luigia Carlucci","family":"Aiello","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB1","series-title":"Handbook of Theoretical Computer Science","article-title":"Logic programming","author":"Apt","year":"1990"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB2","unstructured":"N. Asokan. Fairness in Electronic Commerce. PhD thesis, University of Waterloo, Canada, 1998."},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB3","doi-asserted-by":"crossref","unstructured":"N. Asokan, M. Schunter, and M. Waidner. Optimistic protocols for fair exchange. In Proceedings of the Fourth ACM Conference on Communications and Computer Security (CCS'97), pages 8\u201317. ACM Press and Addison Wesley, 1997.","DOI":"10.1145\/266420.266426"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB4","doi-asserted-by":"crossref","unstructured":"G. Bella, F. Massacci, L. Paulson, and P. Tramontano. Formal verification of Card-Holder Registration in SET. In F. Cuppens, Y. Deswarte, and D. Gollman, editors, Proceedings of the Sixth European Symposium on Research in Computer Security (ESORICS 2000), volume 1895 of Lecture Notes in Computer Science, pages 159\u2013174. Springer-Verlag, 2000.","DOI":"10.1007\/10722599_10"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB5","doi-asserted-by":"crossref","unstructured":"G. Bella and L. C. Paulson. Kerberos version IV: Inductive analysis of the secrecy goals. In Proceedings of the Fifth European Symposium on Research in Computer Security (ESORICS'98), volume 1485 of Lecture Notes in Computer Science, pages 361\u2013375. Springer-Verlag, 1998.","DOI":"10.1007\/BFb0055875"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB6","doi-asserted-by":"crossref","unstructured":"D. Bolignano. An approach to the formal verification of cryptographic protocols. In Proceedings of the Third ACM Conference on Communications and Computer Security (CCS'96), pages 106\u2013118, 1996.","DOI":"10.1145\/238168.238196"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB7","unstructured":"S. Brackin. Automatic formal analyses of two large commercial protocols. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997."},{"issue":"1","key":"10.1016\/S1571-0661(04)00244-0_NEWBIB8","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","article-title":"A logic for authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"ACM Transactions on Computer Systems"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB9","series-title":"IEEE Computer Security Foundation Workshop","first-page":"88","article-title":"An executable specification language for planning attacks to security protocols","author":"Aiello","year":"2000"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB10","doi-asserted-by":"crossref","DOI":"10.1145\/383779.383785","article-title":"Verifying security protocols as planning in logic programming","author":"Aiello","year":"2001","journal-title":"ACM Transactions on Computational Logic"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB11","unstructured":"J. Clark and J. Jacob. A survey of authentication protocol literature: Version 1.0. Technical report, University of York, Department of Computer Science, November 1997. Available on the web at http:\/\/www-users.cs.york.ac.uk\/~jac\/."},{"issue":"9","key":"10.1016\/S1571-0661(04)00244-0_NEWBIB12","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1109\/32.629493","article-title":"The compositional security checker: A tool for the verification of information flow security properties","volume":"23","author":"Focardi","year":"1997","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB13","series-title":"Proceedings of the Ninth IEEE Computer Security Foundations Workshop (CSFW'96)","first-page":"162","article-title":"Some new attacks upon security protocols","author":"Lowe","year":"1996"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB14","doi-asserted-by":"crossref","unstructured":"G. Lowe. A hierarchy of authentication specifications. In Proceedings of the Tenth IEEE Computer Security Foundations Workshop (CSFW'97), pages 31\u201343. IEEE Computer Society Press, 1997.","DOI":"10.1109\/CSFW.1997.596782"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB15","unstructured":"Mastercard & VISA. SET Secure Electronic Transaction Specification: Business Description, May 1997. Available electronically at http:\/\/www.setco.org\/set_specifications.html."},{"issue":"2","key":"10.1016\/S1571-0661(04)00244-0_NEWBIB16","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","article-title":"The NRL Protocol Analyzer: An overview","volume":"26","author":"Meadows","year":"1994","journal-title":"Journal of Logic Programming"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB17","doi-asserted-by":"crossref","unstructured":"C. A. Meadows. Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Proceedings of the Fourth European Symposium on Research in Computer Security (ESORICS'96), volume 1146 of Lecture Notes in Computer Science, pages 351\u2013364. Springer-Verlag, 1996.","DOI":"10.1007\/3-540-61770-1_46"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB18","doi-asserted-by":"crossref","unstructured":"J. Mitchell, M. Mitchell, and U. Stern. Automated analysis of cryptographic protocols using Murphi. In Proceedings of the Sixteenth IEEE Symposium on Security and Privacy (SSP'97), pages 141\u2013151. IEEE Computer Society Press, 1997.","DOI":"10.1109\/SECPRI.1997.601329"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB19","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","article-title":"The inductive approach to verifying cryptographic protocols","volume":"6","author":"Paulson","year":"1998","journal-title":"Journal of Computer Security"},{"issue":"3","key":"10.1016\/S1571-0661(04)00244-0_NEWBIB20","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1145\/322510.322530","article-title":"Inductive analysis of the internet protocol TLS","volume":"2","author":"Paulson","year":"1999","journal-title":"ACM Transactions on Information and System Security"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB21","series-title":"Knowledge in Action: Logical Foundations for Describing and Implementing Dynamical Systems","author":"Reiter","year":"2001"},{"issue":"9","key":"10.1016\/S1571-0661(04)00244-0_NEWBIB22","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1109\/32.713329","article-title":"Verifying authentication protocols in CSP","volume":"24","author":"Schneider","year":"1998","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB23","series-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"Schneier","year":"1994"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB24","unstructured":"V. Shmatikov and J. Mitchell. Analysis of a fair exchange protocol. In Proc. of NDSS 2000, pages 119\u2013128, San Diego, 2000."},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB25","doi-asserted-by":"crossref","unstructured":"D. Song. Athena: An automatic checker for security protocol analysis. In Proceedings of the Twelfth IEEE Computer Security Foundations Workshop (CSFW'99). IEEE Computer Society Press, 1999.","DOI":"10.1109\/CSFW.1999.779773"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB26","doi-asserted-by":"crossref","unstructured":"S. Stoller. A bound on attacks on payment protocols. In Proceedings of the Sixteenth IEEE Symposium on Logic in Computer Science (LICS 2001). IEEE Computer Society Press, 2001.","DOI":"10.1109\/LICS.2001.932483"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB27","doi-asserted-by":"crossref","unstructured":"P. F. Syverson and P. C. van Oorschot. On unifying some cryptographic protocols logics. In Proceedings of the Thirteenth IEEE Symposium on Security and Privacy (SSP'94). IEEE Computer Society Press, 1994.","DOI":"10.1109\/RISP.1994.296595"},{"key":"10.1016\/S1571-0661(04)00244-0_NEWBIB28","doi-asserted-by":"crossref","unstructured":"F. Thayer Fabrega, J. Herzog, and J. Guttman. Honest ideals on strand spaces. In Proceedings of the Eleventh IEEE Computer Security Foundations Workshop (CSFW'98). IEEE Computer Society Press, 1998.","DOI":"10.1109\/CSFW.1998.683156"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104002440?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104002440?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,29]],"date-time":"2020-03-29T12:27:15Z","timestamp":1585484835000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104002440"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,1]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,1]]}},"alternative-id":["S1571066104002440"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)00244-0","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2003,1]]}}}