{"id":"https://openalex.org/W2534475152","doi":"https://doi.org/10.1093/comjnl/bxw066","title":"Security Proofs for Protocols Involving Humans","display_name":"Security Proofs for Protocols Involving Humans","publication_year":2016,"publication_date":"2016-10-20","ids":{"openalex":"https://openalex.org/W2534475152","doi":"https://doi.org/10.1093/comjnl/bxw066","mag":"2534475152"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxw066","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxw066","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020142741","display_name":"Kenneth Radke","orcid":null},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Kenneth Radke","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, Queensland University of Technology, Brisbane City, QLD 4000, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, Queensland University of Technology, Brisbane City, QLD 4000, Australia","institution_ids":["https://openalex.org/I160993911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091630171","display_name":"Colin Boyd","orcid":null},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Colin Boyd","raw_affiliation_strings":["Department of Telematics, Norwegian University of Science and Technology, 7491 Trondheim, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Telematics, Norwegian University of Science and Technology, 7491 Trondheim, Norway","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020142741"],"corresponding_institution_ids":["https://openalex.org/I160993911"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.1424602,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7715786695480347},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.6437292098999023},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5910791158676147},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.580952525138855},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5642318725585938},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5272366404533386},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.509173572063446},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.46782344579696655},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.42209818959236145},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4017162322998047},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08086153864860535}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7715786695480347},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.6437292098999023},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5910791158676147},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.580952525138855},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5642318725585938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5272366404533386},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.509173572063446},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.46782344579696655},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.42209818959236145},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4017162322998047},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08086153864860535},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxw066","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxw066","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W39167138","https://openalex.org/W417364168","https://openalex.org/W1529679142","https://openalex.org/W1542059364","https://openalex.org/W1544402772","https://openalex.org/W1603565383","https://openalex.org/W1607643969","https://openalex.org/W2022302485","https://openalex.org/W2034441575","https://openalex.org/W2037202491","https://openalex.org/W2099180072","https://openalex.org/W2099256741","https://openalex.org/W2105523261","https://openalex.org/W2105746871","https://openalex.org/W2107506969","https://openalex.org/W2109767152","https://openalex.org/W2113999696","https://openalex.org/W2131906261","https://openalex.org/W2153041122","https://openalex.org/W2153281696","https://openalex.org/W2157604883","https://openalex.org/W2159840470","https://openalex.org/W2163005041","https://openalex.org/W2177399963","https://openalex.org/W2256890838","https://openalex.org/W2295782180","https://openalex.org/W2401210256","https://openalex.org/W2461796879","https://openalex.org/W2479333226","https://openalex.org/W2494379008","https://openalex.org/W2497768360","https://openalex.org/W2752853835","https://openalex.org/W4210726200","https://openalex.org/W6677048494"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W2141019415","https://openalex.org/W2126560026","https://openalex.org/W4205636420"],"abstract_inverted_index":{"We":[0,21,67],"introduce":[1],"the":[2,13,44,89],"notion":[3,45],"of":[4,46,91],"human-followable":[5,36,78],"security":[6,37,62,79],"wherein":[7],"a":[8,26,60],"human":[9],"user":[10],"can":[11],"understand":[12],"process":[14],"and":[15,49,80],"logic":[16],"behind":[17],"cryptographic":[18],"authentication":[19,73],"protocols.":[20],"use":[22],"Transport":[23],"Layer":[24],"Security,":[25],"widely":[27],"used":[28],"protocol,":[29],"as":[30],"an":[31],"example":[32],"to":[33,58,70],"explain":[34],"why":[35],"is":[38],"required.":[39],"From":[40],"there,":[41],"we":[42],"define":[43],"human-perceptible":[47],"freshness":[48],"build":[50],"on":[51],"recent":[52],"work":[53],"by":[54],"Jager":[55,92],"et":[56,93],"al.":[57,94],"provide":[59],"protocol":[61],"model":[63],"incorporating":[64],"this":[65,83],"notion.":[66],"show":[68],"how":[69],"transform":[71],"existing":[72],"protocols":[74,76,86,96],"into":[75,95],"with":[77],"prove":[81],"that":[82],"transformation":[84],"turns":[85],"secure":[87,97],"in":[88,98],"sense":[90],"our":[99],"extended":[100],"model.":[101]},"counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
