{"id":"https://openalex.org/W2172081477","doi":"https://doi.org/10.1109/csfw.2005.8","title":"Analysis of Typed Analyses of Authentication Protocols","display_name":"Analysis of Typed Analyses of Authentication Protocols","publication_year":2005,"publication_date":"2005-07-06","ids":{"openalex":"https://openalex.org/W2172081477","doi":"https://doi.org/10.1109/csfw.2005.8","mag":"2172081477"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/csfw.2005.8","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077037306","display_name":"Michele Bugliesi","orcid":"https://orcid.org/0000-0002-4567-3351"},"institutions":[{"id":"https://openalex.org/I149461666","display_name":"Ca' Foscari University of Venice","ror":"https://ror.org/04yzxz566","country_code":"IT","type":"education","lineage":["https://openalex.org/I149461666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"M. Bugliesi","raw_affiliation_strings":["Dipartimento di Informatica, Universit\u00e0 Ca'Foscari di Venezia, Venezia, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 Ca'Foscari di Venezia, Venezia, Italy","institution_ids":["https://openalex.org/I149461666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056869421","display_name":"Riccardo Focardi","orcid":"https://orcid.org/0000-0003-0101-0692"},"institutions":[{"id":"https://openalex.org/I149461666","display_name":"Ca' Foscari University of Venice","ror":"https://ror.org/04yzxz566","country_code":"IT","type":"education","lineage":["https://openalex.org/I149461666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"R. Focardi","raw_affiliation_strings":["Dipartimento di Informatica, Universit\u00e0 Ca'Foscari di Venezia, Venezia, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 Ca'Foscari di Venezia, Venezia, Italy","institution_ids":["https://openalex.org/I149461666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059351004","display_name":"Matteo Maffei","orcid":"https://orcid.org/0000-0001-8061-1685"},"institutions":[{"id":"https://openalex.org/I149461666","display_name":"Ca' Foscari University of Venice","ror":"https://ror.org/04yzxz566","country_code":"IT","type":"education","lineage":["https://openalex.org/I149461666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"M. Maffei","raw_affiliation_strings":["Dipartimento di Informatica, Universit\u00e0 Ca'Foscari di Venezia, Venezia, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 Ca'Foscari di Venezia, Venezia, Italy","institution_ids":["https://openalex.org/I149461666"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.493,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":25,"citation_normalized_percentile":{"value":0.86956,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":88,"max":89},"biblio":{"volume":null,"issue":null,"first_page":"112","last_page":"125"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9896,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7232052},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.56721103},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.46618244},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37885758}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/csfw.2005.8","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1528170493","https://openalex.org/W1660562555","https://openalex.org/W1991354622","https://openalex.org/W2057657013","https://openalex.org/W2104130981","https://openalex.org/W2104655005","https://openalex.org/W2105237010","https://openalex.org/W2111477637","https://openalex.org/W2114637472","https://openalex.org/W2122613424","https://openalex.org/W2134732832","https://openalex.org/W2135758617","https://openalex.org/W2156773905","https://openalex.org/W2174624365","https://openalex.org/W2175661655","https://openalex.org/W2176696677","https://openalex.org/W4285719527","https://openalex.org/W4289127653"],"related_works":["https://openalex.org/W3161945954","https://openalex.org/W2793020157","https://openalex.org/W2602592226","https://openalex.org/W2547137208","https://openalex.org/W2369089912","https://openalex.org/W2353380350","https://openalex.org/W2059809967","https://openalex.org/W1600724867","https://openalex.org/W1577036450","https://openalex.org/W1493058717"],"abstract_inverted_index":{"This":[0,112,139],"paper":[1,113],"contrasts":[2],"two":[3,116,149],"existing":[4],"type-based":[5],"techniques":[6,166],"for":[7,23],"the":[8,31,40,47,63,77,81,85,101,105,109,115,145,148,171],"analysis":[9],"of":[10,53,80,108,122],"authentication":[11,41,86,110],"protocols.":[12],"The":[13,43,88],"former,":[14],"proposed":[15,45],"by":[16,46,126],"Gordon":[17,135],"and":[18,25,37,55,136,151,156],"Jeffrey,":[19],"uses":[20],"dependent":[21,67],"types":[22,69],"nonces":[24,34],"cryptographic":[26],"keys":[27],"to":[28,58,70,95,163,170],"statically":[29,71],"regulate":[30],"way":[32],"that":[33,75,97,131],"are":[35,91],"created":[36],"checked":[38,93],"in":[39,84],"exchange.":[42,87,111],"latter,":[44],"authors,":[48],"relies":[49],"on":[50,119,152],"a":[51,120],"combination":[52],"static":[54],"dynamic":[56],"typing":[57],"achieve":[59],"similar":[60],"goals.":[61],"Specifically,":[62],"type":[64,89,132],"system":[65],"employs":[66],"ciphertext":[68],"define":[72],"certain":[73],"tags":[74,90],"determine":[76],"typed":[78],"structure":[79],"messages":[82],"circulated":[83],"then":[92],"dynamically":[94],"verify":[96],"each":[98],"message":[99],"has":[100],"format":[102],"expected":[103],"at":[104],"corresponding":[106],"step":[107],"compares":[114],"approaches,":[117],"drawing":[118],"translation":[121,140],"tagged":[123],"protocols,":[124],"validated":[125],"our":[127],"system,":[128],"into":[129,144],"protocols":[130],"check":[133],"with":[134],"Jeffrey's":[137],"system.":[138],"gives":[141],"new":[142],"insight":[143],"tradeoffs":[146],"between":[147],"techniques,":[150],"their":[153],"relative":[154],"expressiveness":[155],"precision.":[157],"In":[158],"addition,":[159],"it":[160],"allows":[161],"us":[162],"port":[164],"verification":[165],"from":[167],"one":[168],"setting":[169],"other.":[172]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2172081477","counts_by_year":[{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":4}],"updated_date":"2024-12-10T11:32:41.301262","created_date":"2016-06-24"}