{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:46:57Z","timestamp":1753602417619,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_14","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"142-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Probabilistic and Timed Analysis of Security Protocols"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9820-6629","authenticated-orcid":false,"given":"Olga","family":"Siedlecka-Lamch","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R Alur","year":"1994","unstructured":"Alur, R., Dill, D.: A theory of timed automata. Theor. Comput. Sci. 126, 183\u2013235 (1994)","journal-title":"Theor. Comput. Sci."},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., et al.: The AVISPA tool for the automated validation of Internet security protocols and applications. In: Proceedings of 17th International Conference on Computer Aided Verification (CAV 2005), LNCS, vol. 3576, pp. 281\u2013285. Springer (2005)","DOI":"10.1007\/11513988_27"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Basin, D., Cremers, C., Meadows, C.: Model checking security protocols. In: Handbook of Model Checking, pp. 727\u2013762 (2018)","DOI":"10.1007\/978-3-319-10575-8_22"},{"issue":"1\u20132","key":"14_CR4","first-page":"1","volume":"1","author":"B Blanchet","year":"2016","unstructured":"Blanchet, B.: Modeling and verifying security protocols with the applied Pi calculus and ProVerif. Found. Trends Priv. Secur. 1(1\u20132), 1\u2013135 (2016)","journal-title":"Found. Trends Priv. Secur."},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proc. R. Soc. Lond. A 426, 233\u2013271 (1989)","journal-title":"Proc. R. Soc. Lond. A"},{"key":"14_CR6","series-title":"Information Security and Cryptography series","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78636-8","volume-title":"Operational Semantics and Verification of Security Protocols","author":"C Cremers","year":"2012","unstructured":"Cremers, C., Mauw, S.: Operational Semantics and Verification of Security Protocols. Information Security and Cryptography series. Springer, Heidelberg (2012)"},{"issue":"4","key":"14_CR7","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s10009-014-0361-y","volume":"17","author":"A David","year":"2015","unstructured":"David, A., Larsen, K.G., et al.: UPPAAL SMC tutorial. Int. J. Softw. Tools Technol. Transf. (STTT) 17(4), 397\u2013415 (2015)","journal-title":"Int. J. Softw. Tools Technol. Transf. (STTT)"},{"key":"14_CR8","unstructured":"Hyla, T., Pejas, J., El Fray, I., Mackow, W., Chocianowicz, W., Szulga, M.: Sensitive information protection on mobile devices using general access structures. In: Proceedings of the Ninth International Conference on Systems, ICONS 2014, pp. 192\u2013196. XPS (Xpert Publishing Services) (2014)"},{"key":"14_CR9","first-page":"313","volume":"85","author":"M Kacprzak","year":"2008","unstructured":"Kacprzak, M., Nabialek, W., Niewiadomski, A., Penczek, W., Polrola, A., Szreter, M., et al.: Verics 2007 - a model checker for knowledge and real-time. Fundamenta Informaticae 85, 313\u2013328 (2008)","journal-title":"Fundamenta Informaticae"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Kurkowski, M., Penczek, W.: Applying timed automata to model checking of security protocols. In: Wang, J. (ed.) Handbook of Finite State Based Models and Applications, pp. 223\u2013254. CRC Press, Boca Raton (2012)","DOI":"10.1201\/b13055-12"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/S0304-3975(01)00046-9","volume":"282","author":"M Kwiatkowska","year":"2002","unstructured":"Kwiatkowska, M., Norman, G., Segala, R., Sproston, J.: Automatic verification of real-time systems with discrete probability distributions. Theor. Comput. Sci. 282, 101\u2013150 (2002)","journal-title":"Theor. Comput. Sci."},{"issue":"7","key":"14_CR12","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.ic.2007.01.004","volume":"205","author":"M Kwiatkowska","year":"2007","unstructured":"Kwiatkowska, M., Norman, G., Sproston, J., Wang, F.: Symbolic model checking for probabilistic timed automata. Inf. Comput. 205(7), 1027\u20131077 (2007)","journal-title":"Inf. Comput."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: TACAS, LNCS, pp. 147\u2013166. Springer (1996)","DOI":"10.1007\/3-540-61042-1_43"},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/s10703-012-0177-x","volume":"43","author":"G Norman","year":"2013","unstructured":"Norman, G., Parker, D., Sproston, J.: Model checking for probabilistic timed automata. Form. Methods Syst. Des. 43(2), 164\u2013190 (2013)","journal-title":"Form. Methods Syst. Des."},{"issue":"3","key":"14_CR15","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/322510.322530","volume":"2","author":"L Paulson","year":"1999","unstructured":"Paulson, L.: Inductive analysis of the Internet protocol TLS. ACM Trans. Inf. Syst. Secur. (TISSEC) 2(3), 332\u2013351 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Siedlecka-Lamch, O., Kurkowski, M., Piatkowski, J.: Probabilistic model checking of security protocols without perfect cryptography assumption. In: Proceedings of 23rd International Conference, Computer Networks 2016, Brunow, Poland, June 14\u201317, Communications in Computer and Information Science, vol. 608, pp. 107\u2013117. Springer (2016)","DOI":"10.1007\/978-3-319-39207-3_10"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Siedlecka-Lamch, O., Szymoniak, S., Kurkowski, M.: A fast method for security protocols verification. In: Proceedings of Computer Information Systems and Industrial Management, Lecture Notes in Computer Science, vol. 11703, pp. 523\u2013534. Springer (2019)","DOI":"10.1007\/978-3-030-28957-7_43"},{"issue":"2","key":"14_CR18","doi-asserted-by":"publisher","first-page":"125","DOI":"10.17512\/jamcm.2016.2.13","volume":"15","author":"O Siedlecka-Lamch","year":"2016","unstructured":"Siedlecka-Lamch, O., Kurkowski, M., Piatkowski, J.: Using probabilistic automata for security protocols verification. J. Appl. Math. Comput. Mech. 15(2), 125\u2013131 (2016)","journal-title":"J. Appl. Math. Comput. Mech."}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:10:29Z","timestamp":1599477029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_14","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}