{"id":"https://openalex.org/W1586945915","doi":"https://doi.org/10.1007/978-3-540-79980-1_14","title":"A Formal Analysis of Complex Type Flaw Attacks on Security Protocols","display_name":"A Formal Analysis of Complex Type Flaw Attacks on Security Protocols","publication_year":2008,"publication_date":"2008-07-28","ids":{"openalex":"https://openalex.org/W1586945915","doi":"https://doi.org/10.1007/978-3-540-79980-1_14","mag":"1586945915"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-79980-1_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-79980-1_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101798811","display_name":"Han Gao","orcid":"https://orcid.org/0000-0002-9604-6956"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Han Gao","raw_affiliation_strings":["Informatics and Mathematical Modelling, Technical University of Denmark, Richard Petersens Plads bldg 322, DK-2800, Kongens Lyngby, Denmark","Informatics and Mathematical Modelling, Technical University of Denmark, Kongens Lyngby, Denmark DK-2800#TAB#"],"affiliations":[{"raw_affiliation_string":"Informatics and Mathematical Modelling, Technical University of Denmark, Richard Petersens Plads bldg 322, DK-2800, Kongens Lyngby, Denmark","institution_ids":["https://openalex.org/I96673099"]},{"raw_affiliation_string":"Informatics and Mathematical Modelling, Technical University of Denmark, Kongens Lyngby, Denmark DK-2800#TAB#","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074423047","display_name":"Chiara Bodei","orcid":"https://orcid.org/0000-0002-0586-9333"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Chiara Bodei","raw_affiliation_strings":["Dipartimento di Informatica, Universit\u00e0 di Pisa, Largo B.\u00a0Pontecorvo, 3, I-56127, Pisa, Italy","Dipartimento di Informatica, Universit\u00e0 di Pisa, Pisa, Italy I-56127"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 di Pisa, Largo B.\u00a0Pontecorvo, 3, I-56127, Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]},{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 di Pisa, Pisa, Italy I-56127","institution_ids":["https://openalex.org/I108290504"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055365661","display_name":"Pierpaolo Degano","orcid":"https://orcid.org/0000-0002-8070-4838"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Pierpaolo Degano","raw_affiliation_strings":["Dipartimento di Informatica, Universit\u00e0 di Pisa, Largo B.\u00a0Pontecorvo, 3, I-56127, Pisa, Italy","Dipartimento di Informatica, Universit\u00e0 di Pisa, Pisa, Italy I-56127"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 di Pisa, Largo B.\u00a0Pontecorvo, 3, I-56127, Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]},{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 di Pisa, Pisa, Italy I-56127","institution_ids":["https://openalex.org/I108290504"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101798811"],"corresponding_institution_ids":["https://openalex.org/I96673099"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.8164,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.90408017,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"167","last_page":"183"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8014504909515381},{"id":"https://openalex.org/keywords/concatenation","display_name":"Concatenation (mathematics)","score":0.6416158080101013},{"id":"https://openalex.org/keywords/type","display_name":"Type (biology)","score":0.5639559030532837},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5548412203788757},{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.5430348515510559},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.540763795375824},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5218926072120667},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5138123631477356},{"id":"https://openalex.org/keywords/confusion","display_name":"Confusion","score":0.47827112674713135},{"id":"https://openalex.org/keywords/data-type","display_name":"Data type","score":0.45425888895988464},{"id":"https://openalex.org/keywords/process-calculus","display_name":"Process calculus","score":0.4151459038257599},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3998972475528717},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3618640899658203},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.353817343711853},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3427571654319763},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.13032647967338562},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12901762127876282}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8014504909515381},{"id":"https://openalex.org/C87619178","wikidata":"https://www.wikidata.org/wiki/Q126002","display_name":"Concatenation (mathematics)","level":2,"score":0.6416158080101013},{"id":"https://openalex.org/C2777299769","wikidata":"https://www.wikidata.org/wiki/Q3707858","display_name":"Type (biology)","level":2,"score":0.5639559030532837},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5548412203788757},{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.5430348515510559},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.540763795375824},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5218926072120667},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5138123631477356},{"id":"https://openalex.org/C2781140086","wikidata":"https://www.wikidata.org/wiki/Q557945","display_name":"Confusion","level":2,"score":0.47827112674713135},{"id":"https://openalex.org/C138958017","wikidata":"https://www.wikidata.org/wiki/Q190087","display_name":"Data type","level":2,"score":0.45425888895988464},{"id":"https://openalex.org/C161771561","wikidata":"https://www.wikidata.org/wiki/Q1970286","display_name":"Process calculus","level":2,"score":0.4151459038257599},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3998972475528717},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3618640899658203},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.353817343711853},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3427571654319763},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.13032647967338562},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12901762127876282},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-540-79980-1_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-79980-1_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:eprints.adm.unipi.it:2196","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401711","display_name":"UnipiEprints Open Archive (Universit\u00e0 di Pisa)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Book"},{"id":"pmh:oai:arpi.unipi.it:11568/196194","is_oa":false,"landing_page_url":"http://hdl.handle.net/11568/196194","pdf_url":null,"source":{"id":"https://openalex.org/S4377196265","display_name":"CINECA IRIS Institutial research information system (University of Pisa)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I108290504","host_organization_name":"University of Pisa","host_organization_lineage":["https://openalex.org/I108290504"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:pure.atira.dk:publications/30bd694e-6793-4747-9d7b-0028950625ca","is_oa":false,"landing_page_url":"https://orbit.dtu.dk/en/publications/30bd694e-6793-4747-9d7b-0028950625ca","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Gao , H , Bodei , C &amp; Degano , P 2008 , A Formal Analysis of Complex Type Flaw Attacks on Security Protocols . in Lecture Notes in Computer Science . vol. 5140 , Springer , pp. 167-183 , 12th International Conference on Algebraic Methodology and Software Technology , Urbana , Illinois , United States , 28/07/2008 .","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W94249443","https://openalex.org/W1491035119","https://openalex.org/W1512010809","https://openalex.org/W1554139597","https://openalex.org/W1562901937","https://openalex.org/W1582911646","https://openalex.org/W1603799276","https://openalex.org/W1605464594","https://openalex.org/W1635800776","https://openalex.org/W1715939358","https://openalex.org/W1727096726","https://openalex.org/W1973054120","https://openalex.org/W1994676271","https://openalex.org/W1995469872","https://openalex.org/W2010939995","https://openalex.org/W2029693536","https://openalex.org/W2047179503","https://openalex.org/W2058129511","https://openalex.org/W2072161326","https://openalex.org/W2090266934","https://openalex.org/W2098830096","https://openalex.org/W2111477637","https://openalex.org/W2117064875","https://openalex.org/W2117094531","https://openalex.org/W2117966086","https://openalex.org/W2118386848","https://openalex.org/W2120600989","https://openalex.org/W2122383397","https://openalex.org/W2126338744","https://openalex.org/W2132898941","https://openalex.org/W2135089787","https://openalex.org/W2141624400","https://openalex.org/W2154209576","https://openalex.org/W2163277844","https://openalex.org/W2273640757","https://openalex.org/W2619633776","https://openalex.org/W2916183516"],"related_works":["https://openalex.org/W1971318400","https://openalex.org/W3006758274","https://openalex.org/W1938475825","https://openalex.org/W2028440485","https://openalex.org/W2163915384","https://openalex.org/W2060289434","https://openalex.org/W1502155617","https://openalex.org/W2199032704","https://openalex.org/W1976558359","https://openalex.org/W1495007874"],"abstract_inverted_index":null,"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
