{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:43:52Z","timestamp":1725727432120},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642386305"},{"type":"electronic","value":"9783642386312"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38631-2_63","type":"book-chapter","created":{"date-parts":[[2013,5,27]],"date-time":"2013-05-27T04:37:49Z","timestamp":1369629469000},"page":"728-734","source":"Crossref","is-referenced-by-count":6,"title":["Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Armando","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Carbone","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Zanetti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","unstructured":"AliasLab. SecureCall Authorization - Web Services Interface v3.0. Technical report, AliasLab (February 2010)"},{"key":"63_CR2","doi-asserted-by":"crossref","unstructured":"Armando, A., Carbone, R., Compagna, L.: LTL Model Checking for Security Protocols. In: JANCL, Special Issue on Logic and Information Security. Hermes Lavoisier (2009)","DOI":"10.3166\/jancl.19.403-429"},{"key":"63_CR3","doi-asserted-by":"crossref","unstructured":"Armando, A., Carbone, R., Zanetti, L.: Formal modeling and automatic security analysis of two-factor and two-channel authentication protocols (2013), http:\/\/www.ai-lab.it\/armando\/pub\/nss13-extended.pdf","DOI":"10.1007\/978-3-642-38631-2_63"},{"key":"63_CR4","unstructured":"Chou, D., Microsoft Corporation: Strong user authentication on the web, http:\/\/msdn.microsoft.com\/en-us\/library\/cc838351.aspx (accessed September 20, 2012)"},{"key":"63_CR5","doi-asserted-by":"crossref","unstructured":"DeFigueiredo, D.: The Case for Mobile Two-Factor Authentication. S&P (2011)","DOI":"10.1109\/MSP.2011.144"},{"key":"63_CR6","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory 2(29) (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"63_CR7","unstructured":"Hagalisletto, A.M.: Analyzing two-factor authentication devices. T.r., U. of Oslo (2007)"},{"key":"63_CR8","doi-asserted-by":"crossref","unstructured":"Hagalisletto, A.M.: Attacks are protocols too. In: ARES, pp. 1197\u20131206 (2007)","DOI":"10.1109\/ARES.2007.46"},{"key":"63_CR9","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: Proc.\u00a0CSFW. IEEE (1997)"},{"key":"63_CR10","unstructured":"RSA. Enhancing one-time passwords for protection against real-time phishing attacks, www.rsasecurity.com (accessed September 20, 2012)"},{"key":"63_CR11","doi-asserted-by":"crossref","unstructured":"van Thanh, D., Jorstad, I., Jonvik, T., van Thuan, D.: Strong authentication with mobile phone as security token. In: MASS 2009, pp. 777\u2013782 (October 2009)","DOI":"10.1109\/ICIN.2009.5357049"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38631-2_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T05:06:24Z","timestamp":1595826384000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38631-2_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642386305","9783642386312"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38631-2_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}