{"id":"https://openalex.org/W4211184092","doi":"https://doi.org/10.1016/s1571-0661(05)80576-6","title":"Preface","display_name":"Preface","publication_year":2003,"publication_date":"2003-01-01","ids":{"openalex":"https://openalex.org/W4211184092","doi":"https://doi.org/10.1016/s1571-0661(05)80576-6"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(05)80576-6","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/s1571-0661(05)80576-6","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032396554","display_name":"Jean Goubault-Larrecq","orcid":"https://orcid.org/0000-0001-5879-3304"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jean Goubault-Larrecq","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":["https://openalex.org/A5032396554"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":59},"biblio":{"volume":"55","issue":"1","first_page":"101","last_page":"102"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9885,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9885,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9623,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9499,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.7930487},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.7595187},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74444556},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7376285},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.53647083},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.49914646},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4692179},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.43764418},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43659672},{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.42025754},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17470282},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(05)80576-6","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(05)80576-6","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W89505464","https://openalex.org/W87530933","https://openalex.org/W4230679059","https://openalex.org/W4210360768","https://openalex.org/W3206889711","https://openalex.org/W2904818008","https://openalex.org/W2289378658","https://openalex.org/W2086756233","https://openalex.org/W1554274402","https://openalex.org/W1531360494"],"abstract_inverted_index":{"This":[0,350,370],"volume":[1,351,356,404],"contains":[2],"the":[3,6,43,52,67,83,99,162,202,211,222,324,361,376,388,395,402,408,411,420,429,447,451,458,461],"Proceedings":[4],"of":[5,12,28,31,38,54,66,69,85,98,118,126,139,152,164,201,213,225,232,245,254,263,290,312,330,345,378,401,431,446,450,460],"First":[7],"Workshop":[8],"on":[9,169],"Logical":[10],"Aspects":[11],"Cryptographic":[13],"Protocol":[14],"Verification":[15],"(LACPV'2001),":[16],"held":[17],"in":[18,42,61,74,102,112,142,191,210,221,256,360,365,387,413,438],"Paris,":[19],"France,":[20],"July":[21,465],"23,":[22],"2001":[23,467],"as":[24,77,187,355],"a":[25,35,47,123,188],"satellite":[26,441],"workshop":[27,204,412],"CAV'01.":[29],"Security":[30],"computer":[32],"systems":[33],"is":[34,45,82,185,205,372,405],"growing":[36],"field":[37,190,212],"concerns.":[39],"While":[40],"security":[41],"large":[44,48],"quite":[46],"and":[49,91,154,261,272,304,382],"daunting":[50],"field,":[51],"study":[53],"cryptographic":[55,75,86,103,128,165,182,214,233,257,264,276],"protocols":[56,104,129],"has":[57,425],"received":[58],"renewed":[59],"interest":[60,226,255],"recent":[62],"years,":[63],"mostly":[64],"because":[65],"emergence":[68],"electronic":[70],"commerce.":[71],"The":[72,199,385],"focus":[73],"protocols,":[76,234],"opposed":[78],"to":[79,110,115,197,206,217,251,280,286,407,419],"mere":[80],"cryptography,":[81,113],"interaction":[84],"primitives":[87],"with":[88,149,457],"message":[89],"exchanges":[90],"possible":[92],"malevolent":[93],"actions":[94],"from":[95,284],"intruders.":[96],"Most":[97],"discovered":[100],"bugs":[101],"are":[105,146,416],"not":[106],"so":[107,155],"much":[108],"tied":[109],"subtleties":[111],"rather":[114],"logical":[116,288],"aspects":[117],"interactions":[119],"between":[120,230,239],"principals.":[121],"From":[122],"protocol-oriented":[124],"point":[125],"view,":[127],"pose":[130],"new":[131,219,270,278],"challenges:":[132],"there":[133],"may":[134],"be":[135,353,392],"an":[136],"unbounded":[137],"number":[138],"principals":[140],"(processes":[141],"parallel),":[143],"state":[144,282],"spaces":[145,283],"infinite":[147,285],"even":[148],"bounded":[150],"numbers":[151],"principals,":[153],"on.":[156],"Several":[157],"models":[158,231],"exist":[159],"that":[160],"handle":[161],"complexity":[163,176,262],"protocol":[166,183,215,258],"verification,":[167],"based":[168],"process":[170],"calculi,":[171],"first-order":[172,246],"logic,":[173],"automata":[174],"theory,":[175],"theory":[177],"among":[178],"others.":[179],"As":[180],"such,":[181],"verification":[184,216,240,265],"emerging":[186],"research":[189],"its":[192,383],"own":[193],"right,":[194],"strongly":[195],"linked":[196],"logic.":[198],"purpose":[200],"LACPV":[203],"bring":[207],"together":[208],"researchers":[209],"share":[218],"results":[220],"field.":[223],"Domains":[224],"include":[227],"formal":[228],"relationships":[229],"translations,":[235],"expressive":[236],"power;":[237],"comparison":[238],"methods,":[241],"accuracy,":[242],"efficiency;":[243],"fragments":[244],"logic":[247],"or":[248],"extensions":[249],"corresponding":[250],"various":[252],"problems":[253],"verification;":[259],"decidability":[260],"problems,":[266],"reachability,":[267],"decidable":[268],"subcases;":[269],"logics":[271],"calculi":[273],"for":[274,316,428,435,454],"verifying":[275],"protocols;":[277],"approaches":[279],"reduce":[281],"finite;":[287],"characterizations":[289],"confidentiality/secrecy,":[291],"authentication/integrity,":[292],"non-duplication,":[293],"non-repudiation,":[294],"etc.":[295],"Three":[296],"invited":[297],"talks,":[298],"by":[299,323],"Y.":[300],"Lakhnech,":[301],"M.":[302],"Rusinowitch,":[303],"R.":[305],"Amadio,":[306],"plus":[307],"five":[308],"submitted":[309],"papers":[310],"out":[311],"ten":[313],"were":[314,321],"selected":[315],"presentation":[317],"at":[318,394,410],"LACPV'2001.":[319],"They":[320],"reviewed":[322],"program":[325],"committee":[326],"consisting,":[327],"besides":[328],"editor,":[329],"Hubert":[331],"ComonLSV,":[332],"ENS":[333],"CachanMourad":[334],"DebbabiUniversit\u00e9":[335],"Laval,":[336],"Qu\u00e9becJon":[337],"MillenComputer":[338],"Science":[339,368,380],"Lab,":[340],"SRI":[341],"InternationalScott":[342],"StollerState":[343],"University":[344],"New":[346],"York,":[347],"Stony":[348],"Brook":[349],"will":[352],"published":[354,373],"55,":[357],"issue":[358],"1,":[359],"series":[362,371,390],"Electronic":[363],"Notes":[364],"Theoretical":[366],"Computer":[367],"(ENTCS).":[369],"electronically":[374],"through":[375],"facilities":[377],"Elsevier":[379],"B.V.":[381],"auspices.":[384],"volumes":[386],"ENTCS":[389,452,462],"can":[391],"accessed":[393],"URL":[396],"http://www.elsevier.nl/locate/entcs":[397],"A":[398],"printed":[399],"version":[400],"current":[403],"distributed":[406],"participants":[409],"Paris.":[414],"We":[415],"very":[417],"grateful":[418],"following":[421],"persons,":[422],"whose":[423],"help":[424,437],"been":[426],"crucial":[427],"success":[430],"LACPV'2001:":[432],"Alain":[433],"Finkel":[434],"his":[436,455],"managing":[439],"CAV":[440],"workshops;":[442],"Mike":[443],"Mislove,":[444],"one":[445],"Managing":[448],"Editors":[449],"series,":[453],"assistance":[456],"use":[459],"style":[463],"files.":[464],"05,":[466],"Jean":[468],"Goubault-Larrecq":[469]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4211184092","counts_by_year":[],"updated_date":"2025-01-19T20:11:06.809007","created_date":"2022-02-13"}