{"id":"https://openalex.org/W1599521561","doi":"https://doi.org/10.1007/978-3-642-13464-7_16","title":"On-the-Fly Trace Generation and Textual Trace Analysis and Their Applications to the Analysis of Cryptographic Protocols","display_name":"On-the-Fly Trace Generation and Textual Trace Analysis and Their Applications to the Analysis of Cryptographic Protocols","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1599521561","doi":"https://doi.org/10.1007/978-3-642-13464-7_16","mag":"1599521561"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-13464-7_16","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-13464-7_16","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-13464-7_16.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-13464-7_16.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071024952","display_name":"Yongyuth Permpoontanalarp","orcid":null},"institutions":[{"id":"https://openalex.org/I60837268","display_name":"King Mongkut's University of Technology Thonburi","ror":"https://ror.org/0057ax056","country_code":"TH","type":"education","lineage":["https://openalex.org/I60837268"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Yongyuth Permpoontanalarp","raw_affiliation_strings":["Logic and Security Laboratory, Department of Computer Engineering, Faculty of Engineering, King Mongkut\u2019s University of Technology Thonburi, Bangkok, Thailand","Logic and Security Laboratory, Department of Computer Engineering, Faculty of Engineering, King Mongkut's University of Technology Thonburi, Bangkok, Thailand#TAB#"],"affiliations":[{"raw_affiliation_string":"Logic and Security Laboratory, Department of Computer Engineering, Faculty of Engineering, King Mongkut\u2019s University of Technology Thonburi, Bangkok, Thailand","institution_ids":["https://openalex.org/I60837268"]},{"raw_affiliation_string":"Logic and Security Laboratory, Department of Computer Engineering, Faculty of Engineering, King Mongkut's University of Technology Thonburi, Bangkok, Thailand#TAB#","institution_ids":["https://openalex.org/I60837268"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5071024952"],"corresponding_institution_ids":["https://openalex.org/I60837268"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.6482,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.83532854,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"201","last_page":"215"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8919442892074585},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.8651660680770874},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.7226227521896362},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6698783040046692},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6272714138031006},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.5997699499130249},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5997662544250488},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4683263599872589},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.4377676248550415},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3567168712615967},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33278244733810425}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8919442892074585},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.8651660680770874},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.7226227521896362},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6698783040046692},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6272714138031006},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.5997699499130249},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5997662544250488},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4683263599872589},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.4377676248550415},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3567168712615967},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33278244733810425},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-13464-7_16","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-13464-7_16","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-13464-7_16.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01055153v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01055153","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.201-215, &#x27E8;10.1007/978-3-642-13464-7_16&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1007/978-3-642-13464-7_16","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-13464-7_16","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-13464-7_16.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322817","display_name":"National Research Council of Thailand","ror":"https://ror.org/018wfhg78"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1599521561.pdf","grobid_xml":"https://content.openalex.org/works/W1599521561.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W105936790","https://openalex.org/W189718129","https://openalex.org/W402600506","https://openalex.org/W1503887377","https://openalex.org/W1531461242","https://openalex.org/W1534850333","https://openalex.org/W1585279410","https://openalex.org/W1589724738","https://openalex.org/W1596447773","https://openalex.org/W1759712729","https://openalex.org/W1822485157","https://openalex.org/W1997423921","https://openalex.org/W2003915781","https://openalex.org/W2029093196","https://openalex.org/W2029693536","https://openalex.org/W2074244772","https://openalex.org/W2096478771","https://openalex.org/W2099306959","https://openalex.org/W2105718332","https://openalex.org/W2114189125","https://openalex.org/W2114620376","https://openalex.org/W2117767383","https://openalex.org/W2122653500","https://openalex.org/W2125894704","https://openalex.org/W2131789459","https://openalex.org/W2133091829","https://openalex.org/W2136877520","https://openalex.org/W2145004220","https://openalex.org/W2150682469","https://openalex.org/W2166933234","https://openalex.org/W2169908972","https://openalex.org/W2484860292","https://openalex.org/W2804848512","https://openalex.org/W2891255201","https://openalex.org/W3013607954","https://openalex.org/W3035112273","https://openalex.org/W4241212268"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W1982325601","https://openalex.org/W4240432851","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216"],"abstract_inverted_index":null,"counts_by_year":[{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
