{"id":"https://openalex.org/W2115361245","doi":"https://doi.org/10.1016/j.entcs.2005.06.007","title":"Deconstructing Alice and Bob","display_name":"Deconstructing Alice and Bob","publication_year":2005,"publication_date":"2005-06-24","ids":{"openalex":"https://openalex.org/W2115361245","doi":"https://doi.org/10.1016/j.entcs.2005.06.007","mag":"2115361245"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.entcs.2005.06.007","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.entcs.2005.06.007","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006730208","display_name":"Carlos Caleiro","orcid":"https://orcid.org/0000-0001-5587-6585"},"institutions":[{"id":"https://openalex.org/I4210154254","display_name":"Instituto Superior de Tecnologias Avan\u00e7adas","ror":"https://ror.org/04hzbg791","country_code":"PT","type":"education","lineage":["https://openalex.org/I4210154254"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Carlos Caleiro","raw_affiliation_strings":["CLC, Department of Mathematics, IST, Lisbon, Portugal#TAB#"],"affiliations":[{"raw_affiliation_string":"CLC, Department of Mathematics, IST, Lisbon, Portugal#TAB#","institution_ids":["https://openalex.org/I4210154254"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101515402","display_name":"Luca Vigan\u00f2","orcid":"https://orcid.org/0000-0001-9916-271X"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Luca Vigan\u00f2","raw_affiliation_strings":["Department of Computer Science ETH Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science ETH Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025344654","display_name":"David Basin","orcid":"https://orcid.org/0000-0003-2952-939X"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"David Basin","raw_affiliation_strings":["Department of Computer Science ETH Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science ETH Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.498,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":19,"citation_normalized_percentile":{"value":0.849169,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":86,"max":87},"biblio":{"volume":"135","issue":"1","first_page":"3","last_page":"22"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9796,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.53524673}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83852446},{"id":"https://openalex.org/C2778222013","wikidata":"https://www.wikidata.org/wiki/Q1136926","display_name":"Alice (programming language)","level":2,"score":0.8026844},{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.7415399},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5714565},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5664181},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.53524673},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.48624173},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.47713232},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.43069047},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.41202688},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.13151026},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1057339},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.entcs.2005.06.007","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.4328","pdf_url":"http://www.avispa-project.org/papers/CVB-arspa05.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.entcs.2005.06.007","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.69,"id":"https://metadata.un.org/sdg/3","display_name":"Good health and well-being"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W1491035119","https://openalex.org/W1538122200","https://openalex.org/W1588668163","https://openalex.org/W1623229847","https://openalex.org/W1752677809","https://openalex.org/W2016402420","https://openalex.org/W2029693536","https://openalex.org/W2104655005","https://openalex.org/W2115361245","https://openalex.org/W2120926795","https://openalex.org/W2127035198","https://openalex.org/W2128844732","https://openalex.org/W2133126578","https://openalex.org/W2175137100","https://openalex.org/W2525331187","https://openalex.org/W3031048092","https://openalex.org/W3162919972"],"related_works":["https://openalex.org/W4232884709","https://openalex.org/W4232172372","https://openalex.org/W2899100898","https://openalex.org/W2137908418","https://openalex.org/W2115361245","https://openalex.org/W2109507516","https://openalex.org/W2090686886","https://openalex.org/W2083338789","https://openalex.org/W1967762279","https://openalex.org/W1485738864"],"abstract_inverted_index":{"Alice&Bob\u2013notation":[0,21],"is":[1,30,159],"a":[2,56,97,149],"simple":[3],"notation":[4],"for":[5],"describing":[6],"security":[7],"protocols":[8],"as":[9,140],"sequences":[10,141],"of":[11,35,58,89,99,102,133,142,152],"message":[12,65,138],"exchanges.":[13],"We":[14,54,119],"show":[15],"that,":[16],"despite":[17],"the":[18,81,90,106,110,117,123,131,153],"fact":[19],"that":[20,80,114,163],"does":[22],"not":[23],"include":[24],"explicit":[25,38],"control":[26],"flow":[27],"constructs,":[28],"it":[29],"possible":[31],"to":[32,46,48,62,77,95,113],"make":[33],"some":[34],"these":[36],"aspects":[37],"when":[39],"producing":[40],"formal":[41],"protocol":[42,51],"models":[43],"without":[44],"having":[45],"resort":[47],"more":[49,168],"expressive":[50,169],"description":[52],"languages.":[53],"introduce":[55],"notion":[57],"incremental":[59,71,164],"symbolic":[60,72,100,165],"run":[61],"formally":[63],"handle":[64],"forwarding":[66],"and":[67,85,161],"conditional":[68],"abortion.":[69],"In":[70,145],"runs,":[73],"we":[74,86,147],"use":[75],"variables":[76],"represent":[78],"messages":[79],"principals":[82,111,134],"cannot":[83],"read,":[84],"characterize":[87],"each":[88],"execution":[91],"steps":[92],"in":[93,116,170],"order":[94],"build":[96],"collection":[98],"subruns":[101],"increasing":[103],"lengths,":[104],"reflecting":[105],"data":[107],"possessed":[108],"by":[109,135],"up":[112],"point":[115],"execution.":[118],"contrast":[120],"this":[121,156],"with":[122],"simpler":[124,157],"(more":[125],"standard)":[126],"approach":[127,158],"based":[128],"on":[129],"formalizing":[130],"behavior":[132],"directly":[136],"interpreting":[137],"exchanges":[139],"atomic":[143],"actions.":[144],"particular,":[146],"provide":[148],"complete":[150],"characterization":[151],"situations":[154],"where":[155],"adequate":[160],"prove":[162],"runs":[166],"are":[167],"general.":[171]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2115361245","counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2024-12-09T11:01:30.246109","created_date":"2016-06-24"}