{"id":"https://openalex.org/W1999378241","doi":"https://doi.org/10.1145/2600176.2600186","title":"A rewriting-based forwards semantics for Maude-NPA","display_name":"A rewriting-based forwards semantics for Maude-NPA","publication_year":2014,"publication_date":"2014-04-08","ids":{"openalex":"https://openalex.org/W1999378241","doi":"https://doi.org/10.1145/2600176.2600186","mag":"1999378241"},"language":"en","primary_location":{"id":"doi:10.1145/2600176.2600186","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600176.2600186","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Symposium and Bootcamp on the Science of Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032149189","display_name":"Santiago Escobar","orcid":"https://orcid.org/0000-0002-3550-4781"},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Santiago Escobar","raw_affiliation_strings":["DSIC-ELP, Universitat Polit\u00e8cnica de Val\u00e8ncia, Spain"],"affiliations":[{"raw_affiliation_string":"DSIC-ELP, Universitat Polit\u00e8cnica de Val\u00e8ncia, Spain","institution_ids":["https://openalex.org/I60053951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021410622","display_name":"Catherine Meadows","orcid":"https://orcid.org/0009-0006-0673-711X"},"institutions":[{"id":"https://openalex.org/I1288214837","display_name":"United States Naval Research Laboratory","ror":"https://ror.org/04d23a975","country_code":"US","type":"facility","lineage":["https://openalex.org/I1288214837","https://openalex.org/I1330347796","https://openalex.org/I175003984","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Catherine Meadows","raw_affiliation_strings":["Naval Research Laboratory, Washington DC","[Naval Research Laboratory, Washington, DC]"],"affiliations":[{"raw_affiliation_string":"Naval Research Laboratory, Washington DC","institution_ids":["https://openalex.org/I1288214837"]},{"raw_affiliation_string":"[Naval Research Laboratory, Washington, DC]","institution_ids":["https://openalex.org/I1288214837"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102754614","display_name":"Jos\u00e9 Meseguer","orcid":"https://orcid.org/0000-0003-4779-3848"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jos\u00e9 Meseguer","raw_affiliation_strings":["University of Illinois at Urbana-Champaign","University of Illinois at Urbana Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"University of Illinois at Urbana Champaign","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076809555","display_name":"Sonia Santiago","orcid":"https://orcid.org/0000-0002-7186-0484"},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Sonia Santiago","raw_affiliation_strings":["DSIC-ELP, Universitat Polit\u00e8cnica de Val\u00e8ncia, Spain"],"affiliations":[{"raw_affiliation_string":"DSIC-ELP, Universitat Polit\u00e8cnica de Val\u00e8ncia, Spain","institution_ids":["https://openalex.org/I60053951"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032149189"],"corresponding_institution_ids":["https://openalex.org/I60053951"],"apc_list":null,"apc_paid":null,"fwci":1.724,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.8579304,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rewriting","display_name":"Rewriting","score":0.7065433263778687},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7013510465621948},{"id":"https://openalex.org/keywords/modulo","display_name":"Modulo","score":0.660457968711853},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.6315048336982727},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5751231908798218},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5353233218193054},{"id":"https://openalex.org/keywords/reachability","display_name":"Reachability","score":0.5226582884788513},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5139210224151611},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4631229341030121},{"id":"https://openalex.org/keywords/operational-semantics","display_name":"Operational semantics","score":0.4584498107433319},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45147740840911865},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4219669699668884},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.41807472705841064},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.41261982917785645},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23338356614112854},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.18913114070892334},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1823069453239441},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14857423305511475}],"concepts":[{"id":"https://openalex.org/C154690210","wikidata":"https://www.wikidata.org/wiki/Q1668499","display_name":"Rewriting","level":2,"score":0.7065433263778687},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7013510465621948},{"id":"https://openalex.org/C54732982","wikidata":"https://www.wikidata.org/wiki/Q1415345","display_name":"Modulo","level":2,"score":0.660457968711853},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.6315048336982727},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5751231908798218},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5353233218193054},{"id":"https://openalex.org/C136643341","wikidata":"https://www.wikidata.org/wiki/Q1361526","display_name":"Reachability","level":2,"score":0.5226582884788513},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5139210224151611},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4631229341030121},{"id":"https://openalex.org/C156325763","wikidata":"https://www.wikidata.org/wiki/Q1930895","display_name":"Operational semantics","level":3,"score":0.4584498107433319},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45147740840911865},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4219669699668884},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.41807472705841064},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.41261982917785645},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23338356614112854},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.18913114070892334},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1823069453239441},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14857423305511475},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2600176.2600186","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600176.2600186","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Symposium and Bootcamp on the Science of Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3899718732","display_name":null,"funder_award_id":"CNS 09-04749, CCF 09-05584, CNS 13-19109","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G463155825","display_name":null,"funder_award_id":"TIN2010-21062-C02-02","funder_id":"https://openalex.org/F4320322930","funder_display_name":"Ministerio de Ciencia e Innovaci\u00f3n"},{"id":"https://openalex.org/G8300934487","display_name":null,"funder_award_id":"CNS 09-04749, CCF 09-05584, CNS 13-19109","funder_id":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations"},{"id":"https://openalex.org/G975480149","display_name":null,"funder_award_id":"PROMETEO2011/052","funder_id":"https://openalex.org/F4320321864","funder_display_name":"Generalitat Valenciana"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321864","display_name":"Generalitat Valenciana","ror":"https://ror.org/0097mvx21"},{"id":"https://openalex.org/F4320322930","display_name":"Ministerio de Ciencia e Innovaci\u00f3n","ror":"https://ror.org/034900433"},{"id":"https://openalex.org/F4320337387","display_name":"Division of Computing and Communication Foundations","ror":"https://ror.org/01mng8331"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W144520658","https://openalex.org/W146244851","https://openalex.org/W598205067","https://openalex.org/W1489516665","https://openalex.org/W1504007491","https://openalex.org/W1536580911","https://openalex.org/W1570621944","https://openalex.org/W1603878273","https://openalex.org/W1678943029","https://openalex.org/W1944323241","https://openalex.org/W1973054120","https://openalex.org/W1976195354","https://openalex.org/W2001788001","https://openalex.org/W2032577199","https://openalex.org/W2042924775","https://openalex.org/W2051588031","https://openalex.org/W2104655005","https://openalex.org/W2114189125","https://openalex.org/W2146973388","https://openalex.org/W2150682469","https://openalex.org/W2155032609","https://openalex.org/W2175429362","https://openalex.org/W2561675875","https://openalex.org/W6997009537"],"related_works":["https://openalex.org/W2136512912","https://openalex.org/W2127267268","https://openalex.org/W2156446763","https://openalex.org/W2067910792","https://openalex.org/W2150194458","https://openalex.org/W2143461633","https://openalex.org/W2889071233","https://openalex.org/W4321471459","https://openalex.org/W2927789344","https://openalex.org/W1498283003"],"abstract_inverted_index":{"The":[0,63],"Maude-NRL":[1],"Protocol":[2],"Analyzer":[3],"(Maude-NPA)":[4],"is":[5,70,90],"a":[6,48,80],"tool":[7],"for":[8,66,93],"reasoning":[9],"about":[10],"the":[11,18,86],"security":[12],"of":[13],"cryptographic":[14],"protocols":[15],"in":[16,46,56],"which":[17],"cryptosystems":[19],"satisfy":[20],"different":[21],"equational":[22,74],"properties.":[23],"It":[24],"tries":[25],"to":[26,58],"find":[27,59],"secrecy":[28],"or":[29,97],"authentication":[30],"attacks":[31],"by":[32],"searching":[33],"backwards":[34,87],"from":[35,85],"an":[36,60,73],"insecure":[37],"attack":[38],"state":[39,94],"pattern":[40],"that":[41,50],"may":[42],"contain":[43],"logical":[44,51,68],"variables,":[45],"such":[47],"way":[49],"variables":[52],"become":[53],"properly":[54],"instantiated":[55],"order":[57],"initial":[61],"state.":[62],"execution":[64],"mechanism":[65],"this":[67],"reachability":[69],"narrowing":[71],"modulo":[72],"theory.":[75],"Although":[76],"Maude-NPA":[77],"also":[78],"possesses":[79],"forwards":[81],"semantics":[82],"naturally":[83],"derivable":[84],"semantics,":[88],"it":[89],"not":[91],"suitable":[92],"space":[95],"exploration":[96],"protocol":[98],"simulation.":[99]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
