{"id":"https:\/\/openalex.org\/W2169338279","doi":"https:\/\/doi.org\/10.1007\/978-3-642-01465-9_13","title":"Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder","display_name":"Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https:\/\/openalex.org\/W2169338279","doi":"https:\/\/doi.org\/10.1007\/978-3-642-01465-9_13","mag":"2169338279"},"language":"en","primary_location":{"id":"doi:10.1007\/978-3-642-01465-9_13","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1007\/978-3-642-01465-9_13","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https:\/\/openalex.org\/P4310319900","https:\/\/openalex.org\/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https:\/\/inria.hal.science\/inria-00179550","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5089138500","display_name":"Francis Klay","orcid":null},"institutions":[{"id":"https:\/\/openalex.org\/I19370010","display_name":"Orange (France)","ror":"https:\/\/ror.org\/035j0tq82","country_code":"FR","type":"company","lineage":["https:\/\/openalex.org\/I19370010"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Francis Klay","raw_affiliation_strings":["France Telecom R&D, Lannion, France"],"affiliations":[{"raw_affiliation_string":"France Telecom R&D, Lannion, France","institution_ids":["https:\/\/openalex.org\/I19370010"]}]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5026634244","display_name":"Laurent Vigneron","orcid":null},"institutions":[{"id":"https:\/\/openalex.org\/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https:\/\/ror.org\/02vnf0c38","country_code":"FR","type":"facility","lineage":["https:\/\/openalex.org\/I1294671590","https:\/\/openalex.org\/I1294671590","https:\/\/openalex.org\/I1326498283","https:\/\/openalex.org\/I277688954","https:\/\/openalex.org\/I4210107720","https:\/\/openalex.org\/I4210121838","https:\/\/openalex.org\/I4210159245","https:\/\/openalex.org\/I90183372"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Laurent Vigneron","raw_affiliation_strings":["LORIA, Nancy Universit\u00e9, Vandoeuvre-l\u00e8s-Nancy, France"],"affiliations":[{"raw_affiliation_string":"LORIA, Nancy Universit\u00e9, Vandoeuvre-l\u00e8s-Nancy, France","institution_ids":["https:\/\/openalex.org\/I4210121838"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https:\/\/openalex.org\/A5089138500"],"corresponding_institution_ids":["https:\/\/openalex.org\/I19370010"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.9942,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.94429612,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"192","last_page":"209"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11800","display_name":"User Authentication and Security Systems","score":0.9990000128746033,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1710","display_name":"Information Systems"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10237","display_name":"Cryptography and Data Security","score":0.9958999752998352,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.8713677525520325},{"id":"https:\/\/openalex.org\/keywords\/non-repudiation","display_name":"Non-repudiation","score":0.7871977090835571},{"id":"https:\/\/openalex.org\/keywords\/protocol","display_name":"Protocol (science)","score":0.7802449464797974},{"id":"https:\/\/openalex.org\/keywords\/mathematical-proof","display_name":"Mathematical proof","score":0.7216107845306396},{"id":"https:\/\/openalex.org\/keywords\/extension","display_name":"Extension (predicate logic)","score":0.5033707022666931},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.4688979685306549},{"id":"https:\/\/openalex.org\/keywords\/simple","display_name":"Simple (philosophy)","score":0.45436906814575195},{"id":"https:\/\/openalex.org\/keywords\/formal-methods","display_name":"Formal methods","score":0.41900426149368286},{"id":"https:\/\/openalex.org\/keywords\/programming-language","display_name":"Programming language","score":0.3846518397331238},{"id":"https:\/\/openalex.org\/keywords\/authentication","display_name":"Authentication (law)","score":0.2807486653327942}],"concepts":[{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.8713677525520325},{"id":"https:\/\/openalex.org\/C44209976","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1327773","display_name":"Non-repudiation","level":3,"score":0.7871977090835571},{"id":"https:\/\/openalex.org\/C2780385302","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q367158","display_name":"Protocol (science)","level":3,"score":0.7802449464797974},{"id":"https:\/\/openalex.org\/C108710211","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11538","display_name":"Mathematical proof","level":2,"score":0.7216107845306396},{"id":"https:\/\/openalex.org\/C2778029271","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.5033707022666931},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.4688979685306549},{"id":"https:\/\/openalex.org\/C2780586882","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.45436906814575195},{"id":"https:\/\/openalex.org\/C75606506","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1049183","display_name":"Formal methods","level":2,"score":0.41900426149368286},{"id":"https:\/\/openalex.org\/C199360897","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q9143","display_name":"Programming language","level":1,"score":0.3846518397331238},{"id":"https:\/\/openalex.org\/C148417208","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2807486653327942},{"id":"https:\/\/openalex.org\/C204787440","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q188504","display_name":"Alternative medicine","level":2,"score":0},{"id":"https:\/\/openalex.org\/C142724271","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7208","display_name":"Pathology","level":1,"score":0},{"id":"https:\/\/openalex.org\/C111472728","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q9471","display_name":"Epistemology","level":1,"score":0},{"id":"https:\/\/openalex.org\/C71924100","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11190","display_name":"Medicine","level":0,"score":0},{"id":"https:\/\/openalex.org\/C2524010","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8087","display_name":"Geometry","level":1,"score":0},{"id":"https:\/\/openalex.org\/C138885662","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q5891","display_name":"Philosophy","level":0,"score":0},{"id":"https:\/\/openalex.org\/C33923547","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q395","display_name":"Mathematics","level":0,"score":0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1007\/978-3-642-01465-9_13","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1007\/978-3-642-01465-9_13","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https:\/\/openalex.org\/P4310319900","https:\/\/openalex.org\/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.229.1887","is_oa":false,"landing_page_url":"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.229.1887","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http:\/\/hal.inria.fr\/docs\/00\/37\/64\/50\/PDF\/paperKV-LNCS5491.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.491.5134","is_oa":false,"landing_page_url":"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.491.5134","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http:\/\/www.avantssar.eu\/pdf\/publications\/paperKV-FAST08.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.99.9253","is_oa":false,"landing_page_url":"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.99.9253","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http:\/\/www.loria.fr\/~vigneron\/Work\/papers\/KlaySV-RR-6324.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:inria-00179550v2","is_oa":true,"landing_page_url":"https:\/\/inria.hal.science\/inria-00179550","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https:\/\/openalex.org\/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https:\/\/openalex.org\/licenses\/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"[Research Report] RR-6324, INRIA. 2007, pp.22","raw_type":"Reports"},{"id":"pmh:oai:HAL:inria-00376450v1","is_oa":true,"landing_page_url":"https:\/\/inria.hal.science\/inria-00376450","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https:\/\/openalex.org\/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https:\/\/openalex.org\/licenses\/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"5th International Workshop on Formal Aspects in Security and Trust - FAST 2008, Oct 2008, Malaga, Spain. pp.192-209, &#x27E8;10.1007\/978-3-642-01465-9_13&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:inria-00179550v2","is_oa":true,"landing_page_url":"https:\/\/inria.hal.science\/inria-00179550","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https:\/\/openalex.org\/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https:\/\/openalex.org\/licenses\/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"[Research Report] RR-6324, INRIA. 2007, pp.22","raw_type":"Reports"},"sustainable_development_goals":[{"score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions","id":"https:\/\/metadata.un.org\/sdg\/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https:\/\/openalex.org\/W82893763","https:\/\/openalex.org\/W1494222766","https:\/\/openalex.org\/W1501555319","https:\/\/openalex.org\/W1535908773","https:\/\/openalex.org\/W1538122200","https:\/\/openalex.org\/W1552843130","https:\/\/openalex.org\/W1583133961","https:\/\/openalex.org\/W1587533474","https:\/\/openalex.org\/W1588668163","https:\/\/openalex.org\/W1589257819","https:\/\/openalex.org\/W1623229847","https:\/\/openalex.org\/W1802356660","https:\/\/openalex.org\/W1806679299","https:\/\/openalex.org\/W1831288070","https:\/\/openalex.org\/W1927383947","https:\/\/openalex.org\/W1989968537","https:\/\/openalex.org\/W2031354738","https:\/\/openalex.org\/W2051876878","https:\/\/openalex.org\/W2058329114","https:\/\/openalex.org\/W2095760637","https:\/\/openalex.org\/W2103770608","https:\/\/openalex.org\/W2108731912","https:\/\/openalex.org\/W2117064875","https:\/\/openalex.org\/W2120708566","https:\/\/openalex.org\/W2129384397","https:\/\/openalex.org\/W2145415641","https:\/\/openalex.org\/W2151461610","https:\/\/openalex.org\/W2152241830","https:\/\/openalex.org\/W2479271659","https:\/\/openalex.org\/W2501266110","https:\/\/openalex.org\/W4255656699","https:\/\/openalex.org\/W4285719527"],"related_works":["https:\/\/openalex.org\/W1940324360","https:\/\/openalex.org\/W2383170811","https:\/\/openalex.org\/W2373409667","https:\/\/openalex.org\/W2349903260","https:\/\/openalex.org\/W2046754829","https:\/\/openalex.org\/W2389597464","https:\/\/openalex.org\/W3022632287","https:\/\/openalex.org\/W2466365002","https:\/\/openalex.org\/W2386248637","https:\/\/openalex.org\/W2382366544"],"abstract_inverted_index":null,"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}