{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T22:29:11Z","timestamp":1772836151185,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540401179","type":"print"},{"value":"9783540448297","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44829-2_12","type":"book-chapter","created":{"date-parts":[[2007,7,3]],"date-time":"2007-07-03T16:01:40Z","timestamp":1183478500000},"page":"181-196","source":"Crossref","is-referenced-by-count":9,"title":["A Methodology for Model-Checking Ad-hoc Networks"],"prefix":"10.1007","author":[{"given":"Irfan","family":"Zakiuddin","sequence":"first","affiliation":[]},{"given":"Michael","family":"Goldsmith","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Whittaker","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Gardiner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,4,15]]},"reference":[{"key":"12_CR1","unstructured":"Perlman, R. Interconnections: Bridges, Switches and Routers. Addison-Wesley, 1999."},{"key":"12_CR2","unstructured":"http:\/\/www.cs.uiowa.edu\/ftp\/selfstab\/bibliography\/"},{"key":"12_CR3","unstructured":"http:\/\/www.ietf.org\/html.charters\/manet-charter.html"},{"key":"12_CR4","unstructured":"Roscoe, A. W. The Theory and Practice of Concurrency. Prentice-Hall, 1998."},{"key":"12_CR5","unstructured":"http:\/\/www.comp.nus.edu.sg\/~tayyc\/cbrp\/"},{"key":"12_CR6","unstructured":"Rodeh, O., K. Birman, D. Dolev. Optimized Group Rekey for Group Communication Systems. Network and Distributed System Security, 2000."},{"key":"12_CR7","unstructured":"Creese, S. Data Independent Induction: CSP Model-checking of Arbitrary Sized Networks. DPhil thesis, University of Oxford, Computing Laboratory, 2001."},{"key":"12_CR8","unstructured":"Milner, R. Communicating and Mobile Systems: The Pi-Calculus. Cambridge University Press, May 1999."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Khurshid, S., D. Jackson. Exploring the Design of an Intentional Naming Scheme with an Automatic Constraint Analyzer. In Proceedings of 15th IEEE International Conference on Automated Software Engineering, Grenoble, France, September 2000.","DOI":"10.1109\/ASE.2000.873646"}],"container-title":["Lecture Notes in Computer Science","Model Checking Software"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44829-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,17]],"date-time":"2019-02-17T17:30:33Z","timestamp":1550424633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44829-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401179","9783540448297"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-44829-2_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]}}}