iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/888251.888252
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T23:02:00Z","timestamp":1730329320158,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,8,27]]},"DOI":"10.1145\/888251.888252","type":"proceedings-article","created":{"date-parts":[[2004,2,4]],"date-time":"2004-02-04T16:10:24Z","timestamp":1075911024000},"page":"1-3","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Automatic verification of cryptographic protocols"],"prefix":"10.1145","author":[{"given":"Bruno","family":"Blanchet","sequence":"first","affiliation":[{"name":"CNRS, \u00c9cole Normale Sup\u00e9rieure, Paris and Max-Planck-Institut f\u00fcr Informatik, Saarbr\u00fccken"}]}],"member":"320","published-online":{"date-parts":[[2003,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503277"},{"key":"e_1_3_2_1_2_1","series-title":"LNCS","first-page":"316","volume-title":"Static Analysis, 10th International Symposium (SAS'03)","author":"Abadi M.","year":"2003","unstructured":"M. Abadi and B. Blanchet . Computer-Assisted Verification of a Protocol for Certified Email . In R. Cousot, editor, Static Analysis, 10th International Symposium (SAS'03) , volume 2694 of LNCS , pages 316 -- 335 . Springer , June 2003 .]] M. Abadi and B. Blanchet. Computer-Assisted Verification of a Protocol for Certified Email. In R. Cousot, editor, Static Analysis, 10th International Symposium (SAS'03), volume 2694 of LNCS, pages 316--335. Springer, June 2003.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/360204.360213"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1998.2740"},{"key":"e_1_3_2_1_5_1","first-page":"3","volume-title":"Proceedings of the First IFIP International Conference on Theoretical Computer Science","volume":"1872","author":"Abadi M.","year":"2000","unstructured":"M. Abadi and P. Rogaway . Reconciling two views of cryptography (The computational soundness of formal encryption) . In Proceedings of the First IFIP International Conference on Theoretical Computer Science , volume 1872 of LNCS, pages 3 -- 22 . Springer , Aug. 2000 .]] M. Abadi and P. Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). In Proceedings of the First IFIP International Conference on Theoretical Computer Science, volume 1872 of LNCS, pages 3--22. Springer, Aug. 2000.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"B.\n Blanchet\n .\n From Secrecy to Authenticity in Security Protocols\n . In M. Hermenegildo and G. Puebla editors 9th International Static Analysis Symposium (SAS'02) volume \n 2477\n of \n LNCS pages \n 342\n --\n 359\n . \n Springer Sept. \n 2002\n .]] B. Blanchet. From Secrecy to Authenticity in Security Protocols. In M. Hermenegildo and G. Puebla editors 9th International Static Analysis Symposium (SAS'02) volume 2477 of LNCS pages 342--359. Springer Sept. 2002.]]","DOI":"10.1007\/3-540-45789-5_25"},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/3-540-36576-1_9","volume-title":"Foundations of Software Science and Computation Structures (FoSSaCS'03)","author":"Blanchet B.","year":"2003","unstructured":"B. Blanchet and A. Podelski . Verification of Cryptographic Protocols: Tagging Enforces Termination . In A. Gordon, editor, Foundations of Software Science and Computation Structures (FoSSaCS'03) , volume 2620 of LNCS , pages 136 -- 152 . Springer , Apr. 2003 .]] B. Blanchet and A. Podelski. Verification of Cryptographic Protocols: Tagging Enforces Termination. In A. Gordon, editor, Foundations of Software Science and Computation Structures (FoSSaCS'03), volume 2620 of LNCS, pages 136--152. Springer, Apr. 2003.]]"},{"key":"e_1_3_2_1_8_1","series-title":"LNCS","volume-title":"Proc. 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003)","author":"Comon-Lundh H.","year":"2003","unstructured":"H. Comon-Lundh and V. Cortier . New decidability results for fragments of first-order logic and application to cryptographic protocols . In R. Nieuwenhuis, editor, In Proc. 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003) , volume 2706 of LNCS . Springer , June 2003 .]] H. Comon-Lundh and V. Cortier. New decidability results for fragments of first-order logic and application to cryptographic protocols. In R. Nieuwenhuis, editor, In Proc. 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003), volume 2706 of LNCS. Springer, June 2003.]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"volume-title":"Workshop on Formal Methods and Security Protocols (FMSP'99)","year":"1999","author":"Durgin N. A.","key":"e_1_3_2_1_10_1","unstructured":"N. A. Durgin , P. D. Lincoln , J. C. Mitchell , and A. Scedrov . Undecidability of bounded security protocols . In Workshop on Formal Methods and Security Protocols (FMSP'99) , 5 July 1999 .]] N. A. Durgin, P. D. Lincoln, J. C. Mitchell, and A. Scedrov. Undecidability of bounded security protocols. In Workshop on Formal Methods and Security Protocols (FMSP'99), 5 July 1999.]]"},{"key":"e_1_3_2_1_11_1","series-title":"LNCS","first-page":"159","volume-title":"Programming Languages and Systems, 12th European Symposium on Programming, ESOP'03","author":"Laud P.","year":"2003","unstructured":"P. Laud . Handling Encryption in an Analysis for Secure Information Flow . In P. Degano, editor, Programming Languages and Systems, 12th European Symposium on Programming, ESOP'03 , volume 2618 of LNCS , pages 159 -- 173 . Springer , Apr. 2003 .]] P. Laud. Handling Encryption in an Analysis for Secure Information Flow. In P. Degano, editor, Programming Languages and Systems, 12th European Symposium on Programming, ESOP'03, volume 2618 of LNCS, pages 159--173. Springer, Apr. 2003.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646480.693776"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"C.\n Weidenbach\n .\n Towards an Automatic Analysis of Security Protocols in First-Order Logic\n . In H. Ganzinger editor 16th International Conference on Automated Deduction (CADE-16) volume \n 1632\n of \n LNAI pages \n 314\n --\n 328\n . \n Springer July \n 1999\n .]] C. Weidenbach. Towards an Automatic Analysis of Security Protocols in First-Order Logic. In H. Ganzinger editor 16th International Conference on Automated Deduction (CADE-16) volume 1632 of LNAI pages 314--328. Springer July 1999.]]","DOI":"10.1007\/3-540-48660-7_29"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/882489.884188"}],"event":{"name":"PPDP03: 5th International Conference on Principles and Practice of Declarative Programming 2003","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"],"location":"Uppsala Sweden","acronym":"PPDP03"},"container-title":["Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/888251.888252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T03:27:42Z","timestamp":1673321262000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/888251.888252"}},"subtitle":["a logic programming approach"],"short-title":[],"issued":{"date-parts":[[2003,8,27]]},"references-count":15,"alternative-id":["10.1145\/888251.888252","10.1145\/888251"],"URL":"https:\/\/doi.org\/10.1145\/888251.888252","relation":{},"subject":[],"published":{"date-parts":[[2003,8,27]]},"assertion":[{"value":"2003-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}