{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:28Z","timestamp":1763467828204},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002253"},{"type":"electronic","value":"9783540362067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36206-1_10","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T07:23:08Z","timestamp":1187248988000},"page":"97-108","source":"Crossref","is-referenced-by-count":4,"title":["Composing Strand Spaces"],"prefix":"10.1007","author":[{"given":"Federico","family":"Crazzolara","sequence":"first","affiliation":[]},{"given":"Glynn","family":"Winskel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,16]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"I. Cervesato, N. A. Durgin, P. D. Lincoln, J. C. Mitchell, and A. Scedrov. Relating strands and multiset rewriting for security protocol analysis. 13th CSFW, 2000.","DOI":"10.3233\/JCS-2005-13203"},{"key":"10_CR2","unstructured":"J. Clark and J. Jacob. A survey of authentication protocol literature: V. 1.0. 1997."},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"F. Crazzolara and G. Winskel. Events in security protocols. 8th ACM CCS, 2001.","DOI":"10.1145\/501983.501998"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 2(29), 1983.","DOI":"10.1109\/TIT.1983.1056650"},{"key":"10_CR5","unstructured":"ITU-TS. ITU-TS Recommendation Z.120: Message Sequence Charts (MSC). 1997."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"M. Nielsen, G. Plotkin, and G. Winskel. Petri nets, Event structures and Domains. Theoretical Computer Science, 13, 1981.","DOI":"10.1016\/0304-3975(81)90112-2"},{"issue":"1","key":"10_CR7","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/BF01379149","volume":"15","author":"V. R. Pratt","year":"1986","unstructured":"V. R. Pratt. Modelling concurrency with partial orders. International Journal of Parallel Programming, 15(1):33\u201371, 1986.","journal-title":"International Journal of Parallel Programming"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"P. Syverson. Towards a Strand Semantics for Authentication Logic. Electronic Notes in Theoretical Computer Science, (20), 1999.","DOI":"10.1016\/S1571-0661(04)80072-0"},{"key":"10_CR9","unstructured":"J. Thayer and J. Guttman. Authentication tests. IEEE Symposium on Security and Privacy, 2000."},{"key":"10_CR10","unstructured":"J. Thayer, J. Herzog, and J. Guttman. Honest ideals on strand spaces. 11th CSFW, 1998."},{"key":"10_CR11","unstructured":"J. Thayer, J. Herzog, and J. Guttman. Strand spaces: Why is a security protocol correct? IEEE Symposium on Security and Privacy, 1998."},{"key":"10_CR12","unstructured":"G. Winskel. Events in computation. PhD thesis, University of Edinburgh, 1980."},{"key":"10_CR13","series-title":"Lect Notes Comput Sci","volume-title":"Adv. Course on Petri nets","author":"G. Winskel","year":"1987","unstructured":"G. Winskel. Event structures. Adv. Course on Petri nets, vol. 255 of LNCS, 1987."},{"key":"10_CR14","series-title":"Lect Notes Comput Sci","volume-title":"Linear Time, Branching Time and Partial Order in Logics and Models for Concurrency","author":"G. Winskel","year":"1988","unstructured":"G. Winskel. An introduction to event structures. Linear Time, Branching Time and Partial Order in Logics and Models for Concurrency, vol. 354 of LNCS, 1988."}],"container-title":["Lecture Notes in Computer Science","FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36206-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T04:08:14Z","timestamp":1556770094000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36206-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002253","9783540362067"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-36206-1_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}