Looping for Good: Cyclic Proofs for Security Protocols Article Swipe
Christoph Sprenger
,
Cas Cremers
,
David Basin
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1145/3719027.3765131
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1145/3719027.3765131
Related Topics
Concepts
No concepts available.
Metadata
- Type
- article
- Landing Page
- https://doi.org/10.1145/3719027.3765131
- OA Status
- gold
- References
- 34
- OpenAlex ID
- https://openalex.org/W4416549360
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4416549360Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1145/3719027.3765131Digital Object Identifier
- Title
-
Looping for Good: Cyclic Proofs for Security ProtocolsWork title
- Type
-
articleOpenAlex work type
- Publication year
-
2025Year of publication
- Publication date
-
2025-11-19Full publication date if available
- Authors
-
Christoph Sprenger, Cas Cremers, David BasinList of authors in order
- Landing page
-
https://doi.org/10.1145/3719027.3765131Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1145/3719027.3765131Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
34Number of works referenced by this work
Full payload
| id | https://openalex.org/W4416549360 |
|---|---|
| doi | https://doi.org/10.1145/3719027.3765131 |
| ids.doi | https://doi.org/10.1145/3719027.3765131 |
| ids.openalex | https://openalex.org/W4416549360 |
| fwci | |
| type | article |
| title | Looping for Good: Cyclic Proofs for Security Protocols |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 2773 |
| biblio.first_page | 2759 |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| language | |
| locations[0].id | doi:10.1145/3719027.3765131 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security |
| locations[0].landing_page_url | https://doi.org/10.1145/3719027.3765131 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5037740498 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-2941-5165 |
| authorships[0].author.display_name | Christoph Sprenger |
| authorships[0].countries | CH |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I35440088 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Science, ETH Zurich, Zurich, Switzerland |
| authorships[0].institutions[0].id | https://openalex.org/I35440088 |
| authorships[0].institutions[0].ror | https://ror.org/05a28rw58 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I2799323385, https://openalex.org/I35440088 |
| authorships[0].institutions[0].country_code | CH |
| authorships[0].institutions[0].display_name | ETH Zurich |
| authorships[0].author_position | middle |
| authorships[0].raw_author_name | Christoph Sprenger |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Computer Science, ETH Zurich, Zurich, Switzerland |
| authorships[1].author.id | https://openalex.org/A5054383139 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-0322-2293 |
| authorships[1].author.display_name | Cas Cremers |
| authorships[1].countries | DE |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I4210128801 |
| authorships[1].affiliations[0].raw_affiliation_string | CISPA Helmholtz Center for Information Security, Saarbrücken, Germany |
| authorships[1].institutions[0].id | https://openalex.org/I4210128801 |
| authorships[1].institutions[0].ror | https://ror.org/02njgxr09 |
| authorships[1].institutions[0].type | facility |
| authorships[1].institutions[0].lineage | https://openalex.org/I1305996414, https://openalex.org/I4210128801 |
| authorships[1].institutions[0].country_code | DE |
| authorships[1].institutions[0].display_name | Helmholtz Center for Information Security |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Cas Cremers |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | CISPA Helmholtz Center for Information Security, Saarbrücken, Germany |
| authorships[2].author.id | https://openalex.org/A5025344654 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-2952-939X |
| authorships[2].author.display_name | David Basin |
| authorships[2].countries | CH |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I35440088 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computer Science, ETH Zurich, Zurich, Switzerland |
| authorships[2].institutions[0].id | https://openalex.org/I35440088 |
| authorships[2].institutions[0].ror | https://ror.org/05a28rw58 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I2799323385, https://openalex.org/I35440088 |
| authorships[2].institutions[0].country_code | CH |
| authorships[2].institutions[0].display_name | ETH Zurich |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | David Basin |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science, ETH Zurich, Zurich, Switzerland |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1145/3719027.3765131 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-11-23T00:00:00 |
| display_name | Looping for Good: Cyclic Proofs for Security Protocols |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-28T17:07:16.059203 |
| primary_topic | |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1145/3719027.3765131 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security |
| best_oa_location.landing_page_url | https://doi.org/10.1145/3719027.3765131 |
| primary_location.id | doi:10.1145/3719027.3765131 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security |
| primary_location.landing_page_url | https://doi.org/10.1145/3719027.3765131 |
| publication_date | 2025-11-19 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4289755308, https://openalex.org/W4232563889, https://openalex.org/W2809727329, https://openalex.org/W1979418580, https://openalex.org/W3129371464, https://openalex.org/W2952227899, https://openalex.org/W3214700495, https://openalex.org/W2618267215, https://openalex.org/W2544274814, https://openalex.org/W4225851476, https://openalex.org/W3128178275, https://openalex.org/W1556837122, https://openalex.org/W1983496086, https://openalex.org/W1999823887, https://openalex.org/W1992696924, https://openalex.org/W4386207956, https://openalex.org/W4385412559, https://openalex.org/W2036265926, https://openalex.org/W3109829490, https://openalex.org/W2765700031, https://openalex.org/W2513374167, https://openalex.org/W4386215065, https://openalex.org/W2014496562, https://openalex.org/W3173363254, https://openalex.org/W3216290363, https://openalex.org/W2652625053, https://openalex.org/W7078691526, https://openalex.org/W7079693796, https://openalex.org/W1542745004, https://openalex.org/W3167472015, https://openalex.org/W2564359929, https://openalex.org/W2029129011, https://openalex.org/W4283311194, https://openalex.org/W2967943502 |
| referenced_works_count | 34 |
| abstract_inverted_index | |
| cited_by_percentile_year | |
| countries_distinct_count | 2 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile |