{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T23:25:21Z","timestamp":1649201121515},"reference-count":6,"publisher":"The Japan Society for Industrial and Applied Mathematics","issue":"0","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSIAM Letters"],"published-print":{"date-parts":[[2011]]},"DOI":"10.14495\/jsiaml.3.97","type":"journal-article","created":{"date-parts":[[2013,12,5]],"date-time":"2013-12-05T01:17:19Z","timestamp":1386206239000},"page":"97-100","source":"Crossref","is-referenced-by-count":0,"title":["Automatic verification of anonymity of protocols"],"prefix":"10.14495","volume":"3","author":[{"given":"Hideki","family":"Sakurada","sequence":"first","affiliation":[{"name":"NTT Communication Science Laboratories, NTT Corporation"}]}],"member":"5623","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] B. Blanchet, M. Abadi and C. Fournet, Automated verification of selected equivalences for security protocols, J. Logic Algebr. Progr., 75 (2008), 3-51.","DOI":"10.1016\/j.jlap.2007.06.002"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] B. Blanchet, Automatic verification of correspondences for security protocols, J. Comput. Secur., 17 (2009), 363-434.","DOI":"10.3233\/JCS-2009-0339"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Commun. ACM, 24 (1981), 84-90.","DOI":"10.1145\/358549.358563"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] A. Fujioka, T. Okamoto and K. Ohta, A Practical Secret Voting Scheme for Large Scale Elections, in: Advances in Cryptology - AUSCRYPT'92, J. Seberry and Y. Zheng eds., Lect. Notes Comput. Sci., Vol. 718, pp. 244-251, Springer-Verlag, Berlin, 1993.","DOI":"10.1007\/3-540-57220-1_66"},{"key":"5","unstructured":"[5] S. Kremer and M. D. Ryan, Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, in: Programming Languages and Systems - 14th European Symposium on Programming, ESOP 2005, M. Sagiv ed., Lect. Notes Comput. Sci., Vol. 3444, pp. 186-200, Springer-Verlag, Berlin, 2005."},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] S. Delaune, M. Ryan and B. Smyth, Automatic Verification of Privacy Properties in the Applied pi Calculus, in: Trust Management II, Y. Karabulut, J. C. Mitchell, P. Herrmann and C. Damsgaard Jensen eds., IFIP Advances in Information and Communication Technology, Vol. 263, pp. 263-278, Springer-Verlag, Berlin, 2008.","DOI":"10.1007\/978-0-387-09428-1_17"}],"container-title":["JSIAM Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/jsiaml\/3\/0\/3_0_97\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T03:53:44Z","timestamp":1618199624000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/jsiaml\/3\/0\/3_0_97\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"references-count":6,"journal-issue":{"issue":"0","published-print":{"date-parts":[[2011]]}},"URL":"https:\/\/doi.org\/10.14495\/jsiaml.3.97","relation":{},"ISSN":["1883-0609","1883-0617"],"issn-type":[{"value":"1883-0609","type":"print"},{"value":"1883-0617","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}