{"id":"https://openalex.org/W2095177696","doi":"https://doi.org/10.1145/1069774.1069788","title":"Security analysis of network protocols","display_name":"Security analysis of network protocols","publication_year":2005,"publication_date":"2005-07-11","ids":{"openalex":"https://openalex.org/W2095177696","doi":"https://doi.org/10.1145/1069774.1069788","mag":"2095177696"},"language":"en","primary_location":{"id":"doi:10.1145/1069774.1069788","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1069774.1069788","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101897622","display_name":"John C. Mitchell","orcid":"https://orcid.org/0000-0002-0024-860X"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"John C. Mitchell","raw_affiliation_strings":["Stanford University, Stanford, CA"],"affiliations":[{"raw_affiliation_string":"Stanford University, Stanford, CA","institution_ids":["https://openalex.org/I97018004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101897622"],"corresponding_institution_ids":["https://openalex.org/I97018004"],"apc_list":null,"apc_paid":null,"fwci":0.2595,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.64332988,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"151","last_page":"152"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7892497181892395},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.7534416913986206},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.6822237968444824},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.5494231581687927},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5395120978355408},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5152695178985596},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.510246753692627},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.4721933603286743},{"id":"https://openalex.org/keywords/probabilistic-analysis-of-algorithms","display_name":"Probabilistic analysis of algorithms","score":0.4670487940311432},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4338884651660919},{"id":"https://openalex.org/keywords/time-complexity","display_name":"Time complexity","score":0.4194013178348541},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4106270372867584},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.25577986240386963},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2412508726119995},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23432657122612}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7892497181892395},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.7534416913986206},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.6822237968444824},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.5494231581687927},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5395120978355408},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5152695178985596},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.510246753692627},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.4721933603286743},{"id":"https://openalex.org/C24404364","wikidata":"https://www.wikidata.org/wiki/Q7246846","display_name":"Probabilistic analysis of algorithms","level":3,"score":0.4670487940311432},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4338884651660919},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.4194013178348541},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4106270372867584},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25577986240386963},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2412508726119995},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23432657122612},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C126322002","wikidata":"https://www.wikidata.org/wiki/Q11180","display_name":"Internal medicine","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1069774.1069788","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1069774.1069788","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6899999976158142,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1480122568","https://openalex.org/W1493927711","https://openalex.org/W1508967933","https://openalex.org/W1522177810","https://openalex.org/W1530116042","https://openalex.org/W1554312721","https://openalex.org/W1597908183","https://openalex.org/W1607941647","https://openalex.org/W1760594424","https://openalex.org/W1898534315","https://openalex.org/W1997423921","https://openalex.org/W2049224403","https://openalex.org/W2106880005","https://openalex.org/W2114497629","https://openalex.org/W2127035198","https://openalex.org/W2131895477","https://openalex.org/W2136855156","https://openalex.org/W2145994227","https://openalex.org/W2149215908","https://openalex.org/W2150682469","https://openalex.org/W2156773905","https://openalex.org/W2159543798","https://openalex.org/W2173955105","https://openalex.org/W2400049039","https://openalex.org/W2907882992","https://openalex.org/W3031048092","https://openalex.org/W3085464677","https://openalex.org/W6662412777"],"related_works":["https://openalex.org/W830096938","https://openalex.org/W2109606716","https://openalex.org/W2030292806","https://openalex.org/W2189202191","https://openalex.org/W2177346860","https://openalex.org/W2145856894","https://openalex.org/W1603360336","https://openalex.org/W2903940728","https://openalex.org/W2494523064","https://openalex.org/W1970110385"],"abstract_inverted_index":{"Security":[0],"analysis":[1],"of":[2,47,61,81,100,109,113,131,158],"network":[3],"protocols":[4],"is":[5],"a":[6,45,85,137],"rich":[7],"scientific":[8],"area":[9],"with":[10],"two":[11],"different":[12],"foundations,":[13],"one":[14,22],"based":[15,23],"on":[16,24,136],"logic":[17,140],"and":[18,21,36,59,70,83,116,125],"symbolic":[19,29,124],"computation,":[20],"computational":[25,51,71,126],"complexity":[26],"theory.":[27],"The":[28,50],"approach":[30,52],"has":[31],"led":[32],"to":[33,77,119],"formal":[34],"logics":[35],"automated":[37],"tools":[38],"that":[39,89],"have":[40],"been":[41],"used":[42],"successfully":[43],"in":[44,155],"number":[46],"case":[48],"studies.":[49],"yields":[53],"more":[54],"insight":[55],"into":[56],"the":[57,79,98,110,121,132,156],"strength":[58],"vulnerabilities":[60],"protocols,":[62],"but":[63],"it":[64],"involves":[65],"explicit":[66],"reasoning":[67,93],"about":[68,150],"probability":[69],"complexity.":[72],"Ideally,":[73],"we":[74],"would":[75],"like":[76],"combine":[78],"advantages":[80],"both":[82],"develop":[84],"simple,":[86],"automatable":[87],"method":[88],"captures":[90],"intuitive":[91],"high-level":[92,138],"principles,":[94],"yet":[95],"accurately":[96],"reflects":[97],"subtleties":[99],"probabilistic":[101,151,159],"polynomial-time":[102,152,160],"computation.":[103],"This":[104],"talk":[105,133],"will":[106,134],"summarize":[107],"some":[108],"main":[111],"lines":[112],"prior":[114],"work":[115],"discuss":[117],"ways":[118],"bridge":[120],"gap":[122],"between":[123],"analysis.":[127],"A":[128],"significant":[129],"portion":[130],"focus":[135],"protocol":[139,153],"whose":[141],"provable":[142],"statements":[143],"are":[144],"correct":[145],"when":[146],"regarded":[147],"as":[148],"assertions":[149],"execution":[154],"face":[157],"attack.":[161]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
