{"id":"https://openalex.org/W2766873529","doi":"https://doi.org/10.1145/3133956.3138846","title":"POSTER","display_name":"POSTER","publication_year":2017,"publication_date":"2017-10-27","ids":{"openalex":"https://openalex.org/W2766873529","doi":"https://doi.org/10.1145/3133956.3138846","mag":"2766873529"},"language":"en","primary_location":{"id":"doi:10.1145/3133956.3138846","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3138846","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047952301","display_name":"Hernan Palombo","orcid":null},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hernan M. Palombo","raw_affiliation_strings":["University of South Florida, Tampa, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of South Florida, Tampa, FL, USA","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085132445","display_name":"Hao Zheng","orcid":"https://orcid.org/0000-0003-0829-9660"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hao Zheng","raw_affiliation_strings":["University of South Florida, Tampa, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of South Florida, Tampa, FL, USA","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071104685","display_name":"Jay Ligatti","orcid":null},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jay Ligatti","raw_affiliation_strings":["University of South Florida, Tampa, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of South Florida, Tampa, FL, USA","institution_ids":["https://openalex.org/I2613432"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047952301"],"corresponding_institution_ids":["https://openalex.org/I2613432"],"apc_list":null,"apc_paid":null,"fwci":0.2072,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57934104,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"2567","last_page":"2569"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9624999761581421,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9291999936103821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6040180325508118}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6040180325508118}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3133956.3138846","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3138846","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W749301920","https://openalex.org/W1531461242","https://openalex.org/W2001788001","https://openalex.org/W2029693536","https://openalex.org/W2084184776","https://openalex.org/W2146973388","https://openalex.org/W2156186849","https://openalex.org/W2584343393","https://openalex.org/W2618267215","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Security":[0],"protocol":[1,8,48],"verification":[2,69,85],"using":[3,66],"commonly-used":[4],"model-checkers":[5],"or":[6],"symbolic":[7],"verifiers":[9],"has":[10],"several":[11,107],"intrinsic":[12],"limitations.":[13],"Spin":[14,79,127],"suffers":[15],"the":[16,33,84],"state":[17],"explosion":[18],"problem;":[19],"Proverif":[20],"may":[21],"report":[22],"false":[23],"attacks.":[24],"An":[25],"alternative":[26],"approach":[27,102],"is":[28,41,52,103],"to":[29,36,118],"use":[30],"Coq.":[31],"However,":[32],"effort":[34],"required":[35],"verify":[37,119],"protocols":[38,72,121],"in":[39,87,126],"Coq":[40,67,88],"high":[42],"for":[43,68,140],"two":[44,120],"main":[45],"reasons:":[46],"correct":[47],"and":[49,56,80,82,95,128,138],"property":[50],"specification":[51,94],"a":[53],"non-trivial":[54],"task,":[55],"security":[57],"proofs":[58,135],"lack":[59],"automation.":[60],"This":[61],"work":[62],"claims":[63],"that":[64,122],"(1)":[65],"of":[70,136,144],"cryptographic":[71],"can":[73,89],"sometimes":[74],"yield":[75],"better":[76],"results":[77,112,125],"than":[78],"Proverif,":[81,129],"(2)":[83],"process":[86],"be":[90],"greatly":[91],"alleviated":[92],"if":[93],"proof":[96],"engineering":[97],"techniques":[98],"are":[99,113],"applied.":[100],"Our":[101],"evaluated":[104],"by":[105],"verifying":[106],"representative":[108],"case":[109],"studies.":[110],"Preliminary":[111],"encouraging,":[114],"we":[115,132],"were":[116],"able":[117],"give":[123],"imprecise":[124],"respectively.":[130],"Further,":[131],"have":[133],"automated":[134],"secrecy":[137],"authentication":[139],"an":[141],"important":[142],"class":[143],"protocols.":[145]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2017-11-10T00:00:00"}
