{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:30:06Z","timestamp":1768523406385,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540673811","type":"print"},{"value":"9783540455707","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10720107_12","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T10:46:59Z","timestamp":1167389219000},"page":"85-90","source":"Crossref","is-referenced-by-count":2,"title":["Modelling Agents\u2019 Knowledge Inductively"],"prefix":"10.1007","author":[{"given":"Giampaolo","family":"Bella","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Burrows, M., Kaufman, C., Lampson, B.: Authentication and Delegation with Smart-cards. DIGITAL Technical Report 67, California (1990)","DOI":"10.1007\/3-540-54415-1_53"},{"key":"12_CR2","unstructured":"Bella, G.: Enhancing the Inductive Approach by Message Reception. Technical Report No. 460, Cambridge University, Computer Laboratory (1999)"},{"key":"12_CR3","unstructured":"Bella, G.: Are Timestamps Worth the Effort? A Formal Treatment. Technical Report No. 427, Cambridge University, Computer Laboratory (1998)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/BFb0055875","volume-title":"Computer Security \u2013 ESORICS 98","author":"G. Bella","year":"1998","unstructured":"Bella, G., Paulson, L.C.: Kerberos Version IV: Inductive Analysis of the Secrecy Goals. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 361\u2013375. Springer, Heidelberg (1998)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Lowe, G.: A Hierarchy of Authentication Specifications. In: Proc. of Tenth IEEE Computer Security Foundations Workshop (1997)","DOI":"10.1109\/CSFW.1997.596782"},{"key":"12_CR6","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security\u00a06, 85\u2013128 (1998)","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10720107_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T07:37:34Z","timestamp":1556005054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10720107_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673811","9783540455707"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/10720107_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000]]}}}