{"id":"https://openalex.org/W2944239365","doi":"https://doi.org/10.1109/access.2019.2915645","title":"LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols","display_name":"LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2944239365","doi":"https://doi.org/10.1109/access.2019.2915645","mag":"2944239365"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2915645","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2915645","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08709784.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08709784.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014393413","display_name":"Jiawen Song","orcid":"https://orcid.org/0000-0002-4916-7317"},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiawen Song","raw_affiliation_strings":["School of Software, East China Jiaotong University, Nanchang, China"],"raw_orcid":"https://orcid.org/0000-0002-4916-7317","affiliations":[{"raw_affiliation_string":"School of Software, East China Jiaotong University, Nanchang, China","institution_ids":["https://openalex.org/I13985625"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047250673","display_name":"Meihua Xiao","orcid":"https://orcid.org/0000-0003-2717-7060"},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meihua Xiao","raw_affiliation_strings":["School of Software, East China Jiaotong University, Nanchang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Software, East China Jiaotong University, Nanchang, China","institution_ids":["https://openalex.org/I13985625"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031932067","display_name":"Ke Yang","orcid":"https://orcid.org/0000-0002-6441-2309"},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Yang","raw_affiliation_strings":["School of Software, East China Jiaotong University, Nanchang, China"],"raw_orcid":"https://orcid.org/0000-0002-6441-2309","affiliations":[{"raw_affiliation_string":"School of Software, East China Jiaotong University, Nanchang, China","institution_ids":["https://openalex.org/I13985625"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081831515","display_name":"Xizhong Wang","orcid":"https://orcid.org/0000-0003-1908-0744"},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xizhong Wang","raw_affiliation_strings":["School of Software, East China Jiaotong University, Nanchang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Software, East China Jiaotong University, Nanchang, China","institution_ids":["https://openalex.org/I13985625"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089004185","display_name":"Xiaomei Zhong","orcid":"https://orcid.org/0000-0001-7479-2723"},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaomei Zhong","raw_affiliation_strings":["School of Software, East China Jiaotong University, Nanchang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Software, East China Jiaotong University, Nanchang, China","institution_ids":["https://openalex.org/I13985625"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5014393413"],"corresponding_institution_ids":["https://openalex.org/I13985625"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.05048109,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"7","issue":null,"first_page":"59871","last_page":"59883"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.7604755759239197},{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.6980358362197876},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6912604570388794},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5613662600517273},{"id":"https://openalex.org/keywords/automated-theorem-proving","display_name":"Automated theorem proving","score":0.5126773118972778},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.49421384930610657},{"id":"https://openalex.org/keywords/axiom","display_name":"Axiom","score":0.45906713604927063},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45204052329063416},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4520327150821686},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.38392072916030884},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.31967949867248535},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3130221962928772},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.14454877376556396}],"concepts":[{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.7604755759239197},{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.6980358362197876},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6912604570388794},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5613662600517273},{"id":"https://openalex.org/C206880738","wikidata":"https://www.wikidata.org/wiki/Q431667","display_name":"Automated theorem proving","level":2,"score":0.5126773118972778},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.49421384930610657},{"id":"https://openalex.org/C167729594","wikidata":"https://www.wikidata.org/wiki/Q17736","display_name":"Axiom","level":2,"score":0.45906713604927063},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45204052329063416},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4520327150821686},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.38392072916030884},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.31967949867248535},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3130221962928772},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.14454877376556396},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2915645","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2915645","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08709784.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:64d17838ae1c4500b95659f80c0526c7","is_oa":true,"landing_page_url":"https://doaj.org/article/64d17838ae1c4500b95659f80c0526c7","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 59871-59883 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2915645","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2915645","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08709784.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5455177317","display_name":null,"funder_award_id":"61562026","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G669324778","display_name":null,"funder_award_id":"61163005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7583467806","display_name":null,"funder_award_id":"20172BCB22015","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2944239365.pdf","grobid_xml":"https://content.openalex.org/works/W2944239365.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W1527386734","https://openalex.org/W1530545191","https://openalex.org/W1977189131","https://openalex.org/W2045828738","https://openalex.org/W2131921367","https://openalex.org/W2162755016","https://openalex.org/W2165477067","https://openalex.org/W2168277905","https://openalex.org/W2293340662","https://openalex.org/W2332831973","https://openalex.org/W2399604893","https://openalex.org/W2463913081","https://openalex.org/W2811042809","https://openalex.org/W2964190304","https://openalex.org/W3137220996","https://openalex.org/W4289763408","https://openalex.org/W6680813970","https://openalex.org/W6697308209","https://openalex.org/W6712432342"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W4308361275","https://openalex.org/W3034338022","https://openalex.org/W2126560026"],"abstract_inverted_index":{"Nowadays,":[0],"more":[1,3],"and":[2,9,52,58,75,128,152,161,171,187,199,209,216],"new":[4],"cryptographic":[5,15,66,83,224],"protocols":[6,16,51],"are":[7],"emerging,":[8],"the":[10,50,62,68,78,93,107,115,119,123,129,132,136,162,172,184,190,194,203,207,212,220],"security":[11],"analysis":[12,214],"of":[13,22,46,64,70,80,96,106,109,121,126,131,138,164,175,189,196,223],"emerging":[14],"is":[17,24,134,159,177],"increasingly":[18],"important.":[19],"The":[20,179],"logic":[21,69,108],"events":[23,71,110],"an":[25],"axiomatic":[26],"method":[27],"based":[28],"on":[29,92],"theorem":[30],"proving,":[31],"designed":[32],"around":[33],"message":[34],"automation":[35],"with":[36,61],"actions":[37],"for":[38],"possible":[39],"protocol":[40,97,213],"steps;":[41],"it":[42,86],"figured":[43],"out":[44],"types":[45],"information":[47],"transmitted":[48],"in":[49,77,113,202,211],"also":[53],"presented":[54],"novel":[55,116],"proof":[56,204],"rules":[57,76,117],"mechanism.":[59],"However,":[60],"emergence":[63],"various":[65],"protocols,":[67,84],"lacks":[72],"corresponding":[73],"axioms":[74],"process":[79],"proving":[81],"certain":[82],"so":[85],"needs":[87],"a":[88,103],"further":[89],"extension.":[90],"Based":[91],"logical":[94],"framework":[95],"composition":[98],"logic,":[99],"this":[100],"paper":[101],"presents":[102],"refined":[104,180],"theory":[105,181],"called":[111],"LoET-E,":[112],"which":[114],"about":[118],"freshness":[120],"nonces,":[122],"event":[124,197],"attributes":[125],"messages,":[127],"states":[130],"predicate":[133],"presented;":[135],"concepts":[137],"<inline-formula":[139,146,153,165],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[140,147,154,166],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[141,148,155,167],"<tex-math":[142,149,156,168],"notation=\"LaTeX\">$Fresh$":[143],"</tex-math></inline-formula>":[144,151,158,170],",":[145],"notation=\"LaTeX\">$Gen$":[150],"notation=\"LaTeX\">$FirstSend$":[157],"introduced;":[160],"definition":[163],"notation=\"LaTeX\">$has$":[169],"honesty":[173],"axiom":[174],"LoET":[176],"extended.":[178],"can":[182],"guarantee":[183],"correctness,":[185],"integrity,":[186],"validity":[188],"original":[191],"axioms,":[192],"ensure":[193],"consistency":[195],"classes":[198],"basic":[200],"sequences":[201],"process,":[205,215],"reduce":[206],"complexity":[208],"redundancy":[210],"most":[217],"importantly,":[218],"extend":[219],"provable":[221],"range":[222],"protocols.":[225]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
