{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1520009407585801600.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"NDL_BIB_ID","@value":"6969122"}},{"identifier":{"@type":"URI","@value":"http://id.ndl.go.jp/bib/6969122"}},{"identifier":{"@type":"URI","@value":"https://ndlsearch.ndl.go.jp/books/R000000004-I6969122"}},{"identifier":{"@type":"NAID","@value":"110003743149"}}],"dc:title":[{"@value":"チュートリアル 暗号化通信のspi計算による形式的検証"},{"@language":"ja-Kana","@value":"チュートリアル アンゴウカ ツウシン ノ spi ケイサン ニ ヨル ケイシキテキ ケンショウ"}],"dcterms:alternative":[{"@value":"チュートリアル 暗号化通信のspi計算による形式的検証"}],"dc:language":"ja","creator":[{"@id":"https://cir.nii.ac.jp/crid/1530009407585801600","@type":"Researcher","foaf:name":[{"@value":"住井 英二郎"}]}],"publication":{"publicationIdentifier":[{"@type":"NDL_BIB_ID","@value":"000000040374"},{"@type":"ISSN","@value":"02896540"},{"@type":"LISSN","@value":"02896540"},{"@type":"NCID","@value":"AN10075819"}],"prism:publicationName":[{"@value":"コンピュータソフトウェア = Computer software / 日本ソフトウェア科学会 編"}],"dc:publisher":[{"@value":"東京 : 日本ソフトウェア科学会 ; 1984-"}],"prism:publicationDate":"2003-11","prism:volume":"20","prism:number":"6","prism:startingPage":"607","prism:endingPage":"616"},"url":[{"@id":"http://id.ndl.go.jp/bib/6969122"},{"@id":"https://ndlsearch.ndl.go.jp/books/R000000004-I6969122"}],"relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1050282812867257600","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@value":"セキュリティプロトコルの略式記法からspi 計算への変換"},{"@language":"en","@value":"Translating Security Protocols from Informal Notation into Spi Calculus"},{"@language":"ja-Kana","@value":"セキュリティプロトコル ノ リャクシキ キホウ カラ spi ケイサン エ ノ ヘンカン"}]},{"@id":"https://cir.nii.ac.jp/crid/1360861292657971584","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"A Calculus for Cryptographic Protocols: The Spi Calculus"}]},{"@id":"https://cir.nii.ac.jp/crid/1361137045888867328","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"A logic of authentication"}]},{"@id":"https://cir.nii.ac.jp/crid/1390001205765257216","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@language":"ja","@value":"spi計算における暗号プロトコルの形式的検証(<特集>数理的技法による情報セキュリティ)"},{"@language":"en","@value":"Formal Verification of Cryptographic Protocols in Spi-Calculus(<Special Topics> Formal Approach to Information Security)"},{"@value":"spi計算における暗号プロトコルの形式的検証"},{"@language":"ja-Kana","@value":"spi ケイサン ニ オケル アンゴウ プロトコル ノ ケイシキテキ ケンショウ"}]},{"@id":"https://cir.nii.ac.jp/crid/1520009407242531328","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@value":"通信プロトコルにおけるサービス不能攻撃耐性解析のための型付きπ計算"},{"@language":"ja-Kana","@value":"ツウシン プロトコル ニ オケル サービス フノウ コウゲキ タイセイ カイセキ ノ タメ ノ カタツキ パイ ケイサン"}]},{"@id":"https://cir.nii.ac.jp/crid/1570009750211072128","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Dagstuhl Seminar on Language-Based Security"}]},{"@id":"https://cir.nii.ac.jp/crid/1570291225115453184","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Mobile Values, New Names, and Secure Communication"}]},{"@id":"https://cir.nii.ac.jp/crid/1570291225187782656","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Authenticity by Typing for Security Protocols"}]},{"@id":"https://cir.nii.ac.jp/crid/1570572701224198656","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Secrecy types for asymmetric communication"}]},{"@id":"https://cir.nii.ac.jp/crid/1570572701757360384","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A Probabilistic Poly-Time Framework for Protocol Analysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1570854175141209088","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"CCured Documentation"}]},{"@id":"https://cir.nii.ac.jp/crid/1571135649702279552","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"The Great Computer Language Shootout"}]},{"@id":"https://cir.nii.ac.jp/crid/1571698600071337216","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1571980075048051200","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1571980075048052736","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Analysis of the SSL 3.0 protocol"}]},{"@id":"https://cir.nii.ac.jp/crid/1572261550024761472","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A Bisimulation Method for Cryptographic Protocols"}]},{"@id":"https://cir.nii.ac.jp/crid/1572261550024762624","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Comp. Lang. ML FAQ"}]},{"@id":"https://cir.nii.ac.jp/crid/1572261551633344256","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Proof Techniques for Cryptographic Processes"}]},{"@id":"https://cir.nii.ac.jp/crid/1572543025001468416","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"GCC extension for protecting applications from stack-smashing attacks"}]},{"@id":"https://cir.nii.ac.jp/crid/1572543025001471872","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1572824499978180096","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Information Flow vs. Resource Access in the Asynchronous Pi-Calculus"}]},{"@id":"https://cir.nii.ac.jp/crid/1573105974954890240","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Fail-Safe ANSI-C Compiler : An Approach to Making C Programs Secure (Progress Report)"}]},{"@id":"https://cir.nii.ac.jp/crid/1573105974954893568","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Finite-State Analysis of SSL 3.0"}]},{"@id":"https://cir.nii.ac.jp/crid/1573105974954895232","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Types and Effects for Asymmetric Cryptographic Protocols"}]},{"@id":"https://cir.nii.ac.jp/crid/1573387449852370176","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)"}]},{"@id":"https://cir.nii.ac.jp/crid/1573668924908313856","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A Formal Analysis of Some Properties of Kerberos 5 Using MSR"}]},{"@id":"https://cir.nii.ac.jp/crid/1573668924908314752","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Limitations of the Kerberos Authentication System"}]},{"@id":"https://cir.nii.ac.jp/crid/1573668926517187328","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"On Bisimulations for the Spi Calculus"}]},{"@id":"https://cir.nii.ac.jp/crid/1573950399704169472","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"The inductive approach to verifying cryptographic protocols"}]},{"@id":"https://cir.nii.ac.jp/crid/1573950399885023872","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Completeness Theorems for the Abadi-Rogaway Logic of Encrypted Expressions"}]},{"@id":"https://cir.nii.ac.jp/crid/1574231874861735552","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Secrecy by Typing in Security Protocols"}]}],"dataSourceIdentifier":[{"@type":"NDL_SEARCH","@value":"oai:ndlsearch.ndl.go.jp:R000000004-I6969122"},{"@type":"CIA","@value":"110003743149"}]}