{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:42:13Z","timestamp":1725496933952},"publisher-location":"Boston, MA","reference-count":26,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387748986"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-74899-3_9","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T12:41:56Z","timestamp":1196512916000},"page":"95-106","source":"Crossref","is-referenced-by-count":19,"title":["Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP"],"prefix":"10.1007","author":[{"given":"Llanos","family":"Tobarra","sequence":"first","affiliation":[]},{"given":"Diego","family":"Cazorla","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Cuartero","sequence":"additional","affiliation":[]},{"given":"Gregorio","family":"D\u00edaz","sequence":"additional","affiliation":[]},{"given":"Emilia","family":"Cambronero","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J.A., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47 (2004) 53\u201357","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Karlof, C, Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, Baltimore, MD, USA, November 3\u20135, 2004, ACM (2004) 162\u2013175","key":"9_CR2","DOI":"10.1145\/1031495.1031515"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.; SPINS: Security protocols for sensor networks. Wireless Networks 8 (2002) 521\u2013534","journal-title":"Wireless Networks"},{"doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Jajodia, S., Atluri, V., Jaeger, T., eds.: ACM Conference on Computer and Communications Security, ACM (2003) 62\u201372","key":"9_CR4","DOI":"10.1145\/948109.948120"},{"unstructured":"Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, IEEE Computer Society (2003) 197","key":"9_CR5"},{"doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In Atluri, V., ed.: ACM Conference on Computer and Communications Security, ACM (2002) 41\u201347","key":"9_CR6","DOI":"10.1145\/586110.586117"},{"doi-asserted-by":"crossref","unstructured":"Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D.E., Pister, K.S.J.: System architecture directions for networked sensors. In: Inter. Conf. on Architectural Support for Programming Languages and Operating Systems, ASPLOS. (2000) 93\u2013104","key":"9_CR7","DOI":"10.1145\/378993.379006"},{"unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.,: Model Checking. The MIT Press (1999)","key":"9_CR8"},{"key":"9_CR9","doi-asserted-by":"crossref","first-page":"53","DOI":"10.3233\/JCS-1998-61-204","volume":"6","author":"G. Lowe","year":"1998","unstructured":"Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6 (1998) 53\u201384","journal-title":"Journal of Computer Security"},{"unstructured":"Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y.; Compagna, L., Cu\u00e9llar, J., Drielsma, P.H., H\u00e9am, P.C., Kouchnarenko, O., Mantovani, J., M\u00f6dersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Vigan\u00f2, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In Etessami, K., Rajamani, S.K., eds.: CAV. Volume 3576 of Lecture Notes in Computer Science., Springer (2005) 281\u2013285","key":"9_CR10"},{"doi-asserted-by":"crossref","unstructured":"Tobarra, M.L., Cazorla, D., Cuartero, F., Diaz, G.: Application of formal methods to the analysis of web services security. In Bravetti, M., Kloul, L., Zavattaro, G., eds.: EPEW\/WS-FM. Volume 3670 of Lecture Notes in Computer Science., Springer (2005) 215\u2013229","key":"9_CR11","DOI":"10.1007\/11549970_16"},{"unstructured":"Backes, M., M\u00f6dersheim, S., Pfitzmann, B., Vigan\u00f2, L.: Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. In Aceto, L., Ing\u00f3lfsd\u00f3ttir, A., eds.: FoSSaCS. Volume 3921 of Lecture Notes in Computer Science., Springer (2006) 428\u2013445","key":"9_CR12"},{"unstructured":"Bhargavqn, K., Fournet, C., Gordon, A.D.: Verifying policy-based security for web services. In Atluri, V., Pfitzmann, B., McDaniel, P.D., eds.: ACM Conference on Computer and Communications Security, ACM (2004) 268\u2013277","key":"9_CR13"},{"doi-asserted-by":"crossref","unstructured":"Mannan, M., van Oorschot, P.C.: A protocol for secure public instant messaging. In Crescenzo, G.D., Rubin, A., eds.: Financial Cryptography. Volume 4107 of Lecture Notes in Computer Science., Springer (2006) 20\u201335","key":"9_CR14","DOI":"10.1007\/11889663_2"},{"doi-asserted-by":"crossref","unstructured":"Mitchell, J.C.: Finite-state analysis of security protocols. In Hu, A.J., Vardi, M.Y., eds.: CAV. Volume 1427 of Lecture Notes in Computer Science., Springer (1998) 71\u201376","key":"9_CR15","DOI":"10.1007\/BFb0028734"},{"unstructured":"Tobarra, M.L., Cazorla, D., Cuartero, F., Diaz, G.: Formal verification of TLS handshake and extensions for wireless networks. In: Proc. of IADIS International Conference on Applied Computing (AC\u201906), San Sebastian, Spain, IADIS Press (2006) 57\u201364","key":"9_CR16"},{"unstructured":"Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P.H., Mantovani, J., M\u00f6dersheim, S., Vigneron, L.: A high level protocol specification language for industrial security-sensitive protocols. In: Proceedings of Workshop on Specification and Automated Processing of Security Requirements (SAPS). (2004) 193\u2013205","key":"9_CR17"},{"unstructured":"Armando, A., Compagna, L.: SATMC: A SAT-based model checker for security protocols. In Alferes, J.J., Leite, J.A., eds.: JELIA. Volume 3229 of Lecture Notes in Computer Science.; Springer (2004) 730\u2013733","key":"9_CR18"},{"unstructured":"Glouche, Y., Genet, T., Heen, O., Courtay, O,: A security protocol animator tool for AVISPA. In: ARTIST2 Workshop on Security Specification and Verification of Embedded Systems, Pisa (2006)","key":"9_CR19"},{"doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.C.C.: On the security of public key protocols. In: FOCS, IEEE (1981) 350\u2013357","key":"9_CR20","DOI":"10.1109\/SFCS.1981.32"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61 (2000) 362\u2013399","journal-title":"J. Comput. Syst. Sci."},{"doi-asserted-by":"crossref","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.; A concrete security treatment of symmetric encryption. In: Proceedings of 38th Annual Symposium on Foundations of Computer Science, IEEE (1997) 394\u2013403","key":"9_CR22","DOI":"10.1109\/SFCS.1997.646128"},{"key":"9_CR23","doi-asserted-by":"crossref","first-page":"217","DOI":"10.3233\/JCS-2003-11204","volume":"11","author":"J. Heather","year":"2003","unstructured":"Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols. Journal of Computer Security 11 (2003) 217\u2013244","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"crossref","unstructured":"Mark Luk, Ghita Mezzour, A.P., Gligor, V.: Minisec: A secure sensor network communication architecture. In: Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN). (2007)","key":"9_CR24","DOI":"10.1109\/IPSN.2007.4379708"},{"key":"9_CR25","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S. Zhu","year":"2006","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2 (2006) 500\u2013528","journal-title":"ACM Transactions on Sensor Networks"},{"doi-asserted-by":"crossref","unstructured":"Watro, R-J., Kong, D., Cuti, S.f., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In Setia, S., Swarup, V., eds.: SASN, ACM (2004) 59\u201364","key":"9_CR26","DOI":"10.1145\/1029102.1029113"}],"container-title":["IFIP International Federation for Information Processing","Wireless Sensor and Actor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-74899-3_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:32:35Z","timestamp":1619670755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-74899-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387748986"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-74899-3_9","relation":{},"subject":[]}}