{"id":"https://openalex.org/W1522231734","doi":"https://doi.org/10.1109/dfma.2005.46","title":"Secrecy Correctness for Security Protocols","display_name":"Secrecy Correctness for Security Protocols","publication_year":2005,"publication_date":"2005-04-01","ids":{"openalex":"https://openalex.org/W1522231734","doi":"https://doi.org/10.1109/dfma.2005.46","mag":"1522231734"},"language":"en","primary_location":{"id":"doi:10.1109/dfma.2005.46","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dfma.2005.46","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"First International Conference on Distributed Frameworks for Multimedia Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071452551","display_name":"Kamel Adi","orcid":"https://orcid.org/0000-0003-2869-0333"},"institutions":[{"id":"https://openalex.org/I33217400","display_name":"Universit\u00e9 du Qu\u00e9bec en Outaouais","ror":"https://ror.org/011pqxa69","country_code":"CA","type":"education","lineage":["https://openalex.org/I33217400","https://openalex.org/I49663120"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"K. Adi","raw_affiliation_strings":["Computer Science and Engineering Department, Universit\u00e9 du Qu\u00e0bec en Outaouais, Gatineau, QUE, Canada","Dept. of Comput. Sci. & Eng., Univ. du Quebec en Outaouais, Gatineau, Que., Canada"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Universit\u00e9 du Qu\u00e0bec en Outaouais, Gatineau, QUE, Canada","institution_ids":["https://openalex.org/I33217400"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Eng., Univ. du Quebec en Outaouais, Gatineau, Que., Canada","institution_ids":["https://openalex.org/I33217400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069841201","display_name":"Liviu Pene","orcid":null},"institutions":[{"id":"https://openalex.org/I33217400","display_name":"Universit\u00e9 du Qu\u00e9bec en Outaouais","ror":"https://ror.org/011pqxa69","country_code":"CA","type":"education","lineage":["https://openalex.org/I33217400","https://openalex.org/I49663120"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"L. Pene","raw_affiliation_strings":["Computer Science and Engineering Department, Universit\u00e9 du Qu\u00e0bec en Outaouais, Gatineau, QUE, Canada","Dept. of Comput. Sci. & Eng., Univ. du Quebec en Outaouais, Gatineau, Que., Canada"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Universit\u00e9 du Qu\u00e0bec en Outaouais, Gatineau, QUE, Canada","institution_ids":["https://openalex.org/I33217400"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Eng., Univ. du Quebec en Outaouais, Gatineau, Que., Canada","institution_ids":["https://openalex.org/I33217400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071452551"],"corresponding_institution_ids":["https://openalex.org/I33217400"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08182031,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"7","issue":null,"first_page":"22","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.9660468697547913},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8122133016586304},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8089118599891663},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.674811840057373},{"id":"https://openalex.org/keywords/bounding-overwatch","display_name":"Bounding overwatch","score":0.6707510948181152},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6481284499168396},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5338524580001831},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5015747547149658},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4404558539390564},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3560855984687805},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22443822026252747},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10517621040344238},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07044073939323425}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.9660468697547913},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8122133016586304},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8089118599891663},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.674811840057373},{"id":"https://openalex.org/C63584917","wikidata":"https://www.wikidata.org/wiki/Q333286","display_name":"Bounding overwatch","level":2,"score":0.6707510948181152},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6481284499168396},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5338524580001831},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5015747547149658},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4404558539390564},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3560855984687805},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22443822026252747},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10517621040344238},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07044073939323425},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dfma.2005.46","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dfma.2005.46","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"First International Conference on Distributed Frameworks for Multimedia Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1523525039","https://openalex.org/W1548312885","https://openalex.org/W1562901937","https://openalex.org/W1569250084","https://openalex.org/W1607134907","https://openalex.org/W1836114257","https://openalex.org/W1991884788","https://openalex.org/W1994676271","https://openalex.org/W2003915781","https://openalex.org/W2097913369","https://openalex.org/W2100317906","https://openalex.org/W2104655005","https://openalex.org/W2105750191","https://openalex.org/W2109268521","https://openalex.org/W2110423379","https://openalex.org/W2115716046","https://openalex.org/W2120072221","https://openalex.org/W2120600989","https://openalex.org/W2145415641","https://openalex.org/W2150682469","https://openalex.org/W2151955821","https://openalex.org/W2480388356","https://openalex.org/W3144368627","https://openalex.org/W4210886820","https://openalex.org/W4213148345","https://openalex.org/W4253208186","https://openalex.org/W6633767394","https://openalex.org/W6634223459"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W1667647204","https://openalex.org/W2404647514","https://openalex.org/W2016567611","https://openalex.org/W4247536566","https://openalex.org/W2475541339","https://openalex.org/W2018477250","https://openalex.org/W3119814709","https://openalex.org/W4241418540","https://openalex.org/W55831818"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3],"address":[4],"security":[5],"protocol":[6],"correctness":[7,40],"with":[8],"respect":[9],"to":[10,64],"secrecy":[11],"and":[12,28,50,58],"present":[13],"a":[14,25,29],"formal":[15],"reasoning":[16],"for":[17,32,38,71,75],"evaluating":[18],"such":[19],"correctness.":[20],"The":[21],"proposed":[22],"framework":[23],"includes":[24],"comprehensive":[26],"analysis":[27],"bounding":[30],"model":[31],"multisession":[33],"attacks":[34],"that":[35],"is":[36],"sufficient":[37],"our":[39],"proofs.":[41],"We":[42],"examine":[43],"the":[44,48],"possible":[45,70],"behavior":[46],"of":[47],"intruder":[49],"draw":[51],"conclusions":[52],"about":[53],"how":[54],"his":[55],"knowledge":[56],"evolves":[57],"what":[59],"actions":[60],"he":[61],"can":[62],"take":[63],"gain":[65],"as":[66,69],"much":[67],"information":[68],"building":[72],"winning":[73],"strategies":[74],"an":[76],"attack.":[77]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
