{"id":"https:\/\/openalex.org\/W2054480450","doi":"https:\/\/doi.org\/10.4304\/jcp.7.4.890-899","title":"Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif","display_name":"Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif","publication_year":2012,"publication_date":"2012-04-01","ids":{"openalex":"https:\/\/openalex.org\/W2054480450","doi":"https:\/\/doi.org\/10.4304\/jcp.7.4.890-899","mag":"2054480450"},"language":"en","primary_location":{"id":"doi:10.4304\/jcp.7.4.890-899","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.4304\/jcp.7.4.890-899","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https:\/\/openalex.org\/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5090025906","display_name":"Bo Meng","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bo Meng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5100392067","display_name":"Wei Wang","orcid":"https:\/\/orcid.org\/0000-0002-7215-7627"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5100344608","display_name":"Wei Chen","orcid":"https:\/\/orcid.org\/0009-0006-6661-5165"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Chen","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https:\/\/openalex.org\/A5090025906"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.4327,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.82837743,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"7","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1710","display_name":"Information Systems"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.910620927810669},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.7244483828544617},{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.6988786458969116},{"id":"https:\/\/openalex.org\/keywords\/denial","display_name":"Denial","score":0.6945659518241882},{"id":"https:\/\/openalex.org\/keywords\/pi-calculus","display_name":"Pi calculus","score":0.6414873003959656},{"id":"https:\/\/openalex.org\/keywords\/protocol","display_name":"Protocol (science)","score":0.5819287300109863},{"id":"https:\/\/openalex.org\/keywords\/service","display_name":"Service (business)","score":0.5531882643699646},{"id":"https:\/\/openalex.org\/keywords\/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5129270553588867},{"id":"https:\/\/openalex.org\/keywords\/voting","display_name":"Voting","score":0.4799002408981323},{"id":"https:\/\/openalex.org\/keywords\/the-internet","display_name":"The Internet","score":0.33827030658721924},{"id":"https:\/\/openalex.org\/keywords\/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2709987759590149},{"id":"https:\/\/openalex.org\/keywords\/cryptography","display_name":"Cryptography","score":0.22654858231544495},{"id":"https:\/\/openalex.org\/keywords\/world-wide-web","display_name":"World Wide Web","score":0.16625645756721497},{"id":"https:\/\/openalex.org\/keywords\/law","display_name":"Law","score":0.14803215861320496},{"id":"https:\/\/openalex.org\/keywords\/medicine","display_name":"Medicine","score":0.10998883843421936},{"id":"https:\/\/openalex.org\/keywords\/business","display_name":"Business","score":0.09068888425827026},{"id":"https:\/\/openalex.org\/keywords\/psychology","display_name":"Psychology","score":0.07739880681037903},{"id":"https:\/\/openalex.org\/keywords\/political-science","display_name":"Political science","score":0.06569764018058777}],"concepts":[{"id":"https:\/\/openalex.org\/C38822068","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.910620927810669},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.7244483828544617},{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.6988786458969116},{"id":"https:\/\/openalex.org\/C2780900520","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q100268981","display_name":"Denial","level":2,"score":0.6945659518241882},{"id":"https:\/\/openalex.org\/C2984882572","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q602886","display_name":"Pi calculus","level":2,"score":0.6414873003959656},{"id":"https:\/\/openalex.org\/C2780385302","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q367158","display_name":"Protocol (science)","level":3,"score":0.5819287300109863},{"id":"https:\/\/openalex.org\/C2780378061","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q25351891","display_name":"Service (business)","level":2,"score":0.5531882643699646},{"id":"https:\/\/openalex.org\/C33884865","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5129270553588867},{"id":"https:\/\/openalex.org\/C520049643","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q189760","display_name":"Voting","level":3,"score":0.4799002408981323},{"id":"https:\/\/openalex.org\/C110875604","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q75","display_name":"The Internet","level":2,"score":0.33827030658721924},{"id":"https:\/\/openalex.org\/C80444323","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2709987759590149},{"id":"https:\/\/openalex.org\/C178489894","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8789","display_name":"Cryptography","level":2,"score":0.22654858231544495},{"id":"https:\/\/openalex.org\/C136764020","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q466","display_name":"World Wide Web","level":1,"score":0.16625645756721497},{"id":"https:\/\/openalex.org\/C199539241","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7748","display_name":"Law","level":1,"score":0.14803215861320496},{"id":"https:\/\/openalex.org\/C71924100","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11190","display_name":"Medicine","level":0,"score":0.10998883843421936},{"id":"https:\/\/openalex.org\/C144133560","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4830453","display_name":"Business","level":0,"score":0.09068888425827026},{"id":"https:\/\/openalex.org\/C15744967","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q9418","display_name":"Psychology","level":0,"score":0.07739880681037903},{"id":"https:\/\/openalex.org\/C17744445","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q36442","display_name":"Political science","level":0,"score":0.06569764018058777},{"id":"https:\/\/openalex.org\/C142724271","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7208","display_name":"Pathology","level":1,"score":0},{"id":"https:\/\/openalex.org\/C11171543","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q41630","display_name":"Psychoanalysis","level":1,"score":0},{"id":"https:\/\/openalex.org\/C94625758","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7163","display_name":"Politics","level":2,"score":0},{"id":"https:\/\/openalex.org\/C162853370","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q39809","display_name":"Marketing","level":1,"score":0},{"id":"https:\/\/openalex.org\/C204787440","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q188504","display_name":"Alternative medicine","level":2,"score":0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304\/jcp.7.4.890-899","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.4304\/jcp.7.4.890-899","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https:\/\/openalex.org\/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8299999833106995,"display_name":"Peace, Justice and strong institutions","id":"https:\/\/metadata.un.org\/sdg\/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https:\/\/openalex.org\/W71457692","https:\/\/openalex.org\/W115894365","https:\/\/openalex.org\/W1482898023","https:\/\/openalex.org\/W1540938962","https:\/\/openalex.org\/W1564274994","https:\/\/openalex.org\/W1882043495","https:\/\/openalex.org\/W1983829712","https:\/\/openalex.org\/W1999229333","https:\/\/openalex.org\/W2002056965","https:\/\/openalex.org\/W2016142193","https:\/\/openalex.org\/W2062105862","https:\/\/openalex.org\/W2073385346","https:\/\/openalex.org\/W2089276145","https:\/\/openalex.org\/W2103313298","https:\/\/openalex.org\/W2105225029","https:\/\/openalex.org\/W2106830965","https:\/\/openalex.org\/W2109140440","https:\/\/openalex.org\/W2111471824","https:\/\/openalex.org\/W2111838608","https:\/\/openalex.org\/W2114189125","https:\/\/openalex.org\/W2145500633","https:\/\/openalex.org\/W2148791173","https:\/\/openalex.org\/W2150670889","https:\/\/openalex.org\/W2160996995","https:\/\/openalex.org\/W2163795263","https:\/\/openalex.org\/W2199032704","https:\/\/openalex.org\/W2313889149","https:\/\/openalex.org\/W2393002031","https:\/\/openalex.org\/W6602876116","https:\/\/openalex.org\/W6646191332","https:\/\/openalex.org\/W6687528731"],"related_works":["https:\/\/openalex.org\/W2035091929","https:\/\/openalex.org\/W2161226151","https:\/\/openalex.org\/W2765658188","https:\/\/openalex.org\/W2235209299","https:\/\/openalex.org\/W2886198660","https:\/\/openalex.org\/W1550584233","https:\/\/openalex.org\/W2163915384","https:\/\/openalex.org\/W4386498994","https:\/\/openalex.org\/W1564764333","https:\/\/openalex.org\/W2986127796"],"abstract_inverted_index":{"Owning":[0],"to":[1,39,143],"the":[2,53,56,135,147,159],"damage":[3],"of":[4,6,13,15,43,55,59,61,63,99,101,121,123,129,149,163,165,167,179],"denial":[5,14,62,100,122,128,148,166],"service":[7,16,64,102,124,130,150,168],"attacks":[8,17,65,103,125,169],"in":[9,22,66,92,170],"security":[10,67],"protocols,":[11],"resistance":[12,60,98,120,164],"plays":[18],"an":[19,176],"important":[20],"role":[21],"remote":[23,33],"voting":[24,35],"protocols.":[25],"Recently":[26],"Meng":[27,86,114,171],"et":[28,78,87,115,172],"al.":[29,79,88,116,173],"proposed":[30],"a":[31,141],"secure":[32],"internet":[34],"protocol":[36,89,117,174],"that":[37,85,113],"claims":[38],"satisfy":[40],"formal":[41,57,80],"definitions":[42],"key":[44],"properties":[45],"without":[46],"physical":[47],"constrains.":[48],"In":[49],"this":[50],"study":[51],"firstly":[52],"review":[54],"model":[58,81],"protocols":[68],"is":[69,90,104,112,118,132],"introduced,":[70],"then":[71],"extended":[72,93],"applied":[73,94],"pi":[74,95],"calculus":[75],"and":[76,181],"Huang":[77],"are":[82,157],"reviewed,":[83],"after":[84],"modeled":[91],"calculus,":[96],"finally":[97],"proved":[105],"with":[106],"ProVerif.":[107],"The":[108],"result":[109],"we":[110,138,156],"obtain":[111],"not":[119],"because":[126],"one":[127],"attack":[131],"found.":[133],"At":[134],"same":[136],"time":[137],"also":[139],"propose":[140],"method":[142],"prevent":[144],"it":[145],"from":[146],"attack.":[151],"To":[152],"our":[153],"best":[154],"knowledge,":[155],"conducting":[158],"first":[160],"mechanized":[161],"proof":[162],"for":[175],"unbounded":[177],"number":[178],"honest":[180],"corrupted":[182],"voters.":[183]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}