{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T07:14:13Z","timestamp":1712301253670},"reference-count":5,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2014,11,20]],"date-time":"2014-11-20T00:00:00Z","timestamp":1416441600000},"content-version":"vor","delay-in-days":4341,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2003,1]]},"DOI":"10.1016\/s1571-0661(04)00245-2","type":"journal-article","created":{"date-parts":[[2004,1,29]],"date-time":"2004-01-29T10:14:39Z","timestamp":1075371279000},"page":"69-84","source":"Crossref","is-referenced-by-count":6,"title":["Models for an Adversary-Centric Protocol Logic"],"prefix":"10.1016","volume":"55","author":[{"given":"Peter","family":"Selinger","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/S1571-0661(04)00245-2_NEWBIB1","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"ACM Transactions on Computer Systems"},{"key":"10.1016\/S1571-0661(04)00245-2_NEWBIB2","doi-asserted-by":"crossref","unstructured":"I. Cervesato, N. A. Durgin, P. D. Lincoln, J. C. Mitchell, and A. Scedrov. A metanotation for protocol analysis. In R. Gorrieri, editor, Proceedings of the 12th IEEE Computer Security Foundations Workshop, CSFW'99. IEEE Computer Society Press, 1999.","DOI":"10.1109\/CSFW.1999.779762"},{"key":"10.1016\/S1571-0661(04)00245-2_NEWBIB3","doi-asserted-by":"crossref","unstructured":"K. J. Compton and S. Dexter. Proof techniques for cryptographic protocols. In Proceedings of ICALP'99, pages 25\u201339. 1999.","DOI":"10.1007\/3-540-48523-6_3"},{"issue":"29","key":"10.1016\/S1571-0661(04)00245-2_NEWBIB4","article-title":"On the security of public-key protocols","volume":"2","author":"Dolev","year":"1983","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/S1571-0661(04)00245-2_NEWBIB5","doi-asserted-by":"crossref","unstructured":"G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems. Springer-Verlag, 1996.","DOI":"10.1007\/3-540-61042-1_43"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104002452?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104002452?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,15]],"date-time":"2019-02-15T09:54:15Z","timestamp":1550224455000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104002452"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,1]]},"references-count":5,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,1]]}},"alternative-id":["S1571066104002452"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)00245-2","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2003,1]]}}}