{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:57:40Z","timestamp":1742954260182,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030620769"},{"type":"electronic","value":"9783030620776"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62077-6_5","type":"book-chapter","created":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T11:25:37Z","timestamp":1603884337000},"page":"61-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["There\u2019s No Time, The Problem of Conceptualising Time"],"prefix":"10.1007","author":[{"given":"Tajana","family":"Ban Kirigin","sequence":"first","affiliation":[]},{"given":"Benedikt","family":"Perak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,28]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/9780429034961","volume-title":"Dynamics of Complex Systems","author":"Y Bar-Yam","year":"2019","unstructured":"Bar-Yam, Y.: Dynamics of Complex Systems. CRC Press, Boca Raton (2019)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Brdar, M., Brdar-Szab\u00f3, R., Perak, B.: Metaphor repositories and cross-linguistic comparison. In: Metaphor and Metonymy in the Digital Age: Theory and Methods for Building Repositories of Figurative Language, vol. 8, p. 64 (2019)","DOI":"10.1075\/milcc.8.10brd"},{"issue":"2","key":"5_CR3","doi-asserted-by":"publisher","first-page":"247","DOI":"10.3233\/JCS-2004-12203","volume":"12","author":"NA Durgin","year":"2004","unstructured":"Durgin, N.A., Lincoln, P., Mitchell, J.C., Scedrov, A.: Multiset rewriting and the complexity of bounded security protocols. J. Comput. Secur. 12(2), 247\u2013311 (2004)","journal-title":"J. Comput. Secur."},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1023\/A:1008216127933","volume":"28","author":"C Emmeche","year":"1997","unstructured":"Emmeche, C., K\u00f8ppe, S., Stjernfelt, F.: Explaining emergence: towards an ontology of levels. J. Gen. Philos. Sci. 28(1), 83\u2013117 (1997)","journal-title":"J. Gen. Philos. Sci."},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1103\/RevModPhys.21.447","volume":"21","author":"K G\u00f6del","year":"1949","unstructured":"G\u00f6del, K.: An example of a new type of cosmological solutions of Einstein\u2019s field equations of gravitation. Rev. Mod. Phys. 21(3), 447 (1949)","journal-title":"Rev. Mod. Phys."},{"issue":"7701","key":"5_CR6","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1038\/d41586-018-04558-7","volume":"556","author":"A Jaffe","year":"2018","unstructured":"Jaffe, A.: The illusion of time. Nature 556(7701), 304\u2013306 (2018)","journal-title":"Nature"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-662-46666-7_14","volume-title":"Principles of Security and Trust","author":"M Kanovich","year":"2015","unstructured":"Kanovich, M., Kirigin, T.B., Nigam, V., Scedrov, A., Talcott, C.: Discrete vs. dense times in the analysis of cyber-physical security protocols. In: Focardi, R., Myers, A. (eds.) POST 2015. LNCS, vol. 9036, pp. 259\u2013279. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-46666-7_14"},{"issue":"6","key":"5_CR8","doi-asserted-by":"publisher","first-page":"585","DOI":"10.3233\/JCS-0560","volume":"25","author":"MI Kanovich","year":"2017","unstructured":"Kanovich, M.I., Ban Kirigin, T., Nigam, V., Scedrov, A., Talcott, C.L.: Time, computational complexity, and probability in the analysis of distance-bounding protocols. J. Comput. Secur. 25(6), 585\u2013630 (2017)","journal-title":"J. Comput. Secur."},{"issue":"3","key":"5_CR9","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1017\/S096012951500016X","volume":"27","author":"MI Kanovich","year":"2017","unstructured":"Kanovich, M.I., Ban Kirigin, T., Nigam, V., Scedrov, A., Talcott, C.L., Perovic, R.: A rewriting framework and logic for activities subject to regulations. Math. Struct. Comput. Sci. 27(3), 332\u2013375 (2017)","journal-title":"Math. Struct. Comput. Sci."},{"issue":"8","key":"5_CR10","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1037\/bul0000045","volume":"142","author":"WJ Matthews","year":"2016","unstructured":"Matthews, W.J., Meck, W.H.: Temporal cognition: connecting subjective time to perception, attention, and memory. Psychol. Bull. 142(8), 865 (2016)","journal-title":"Psychol. Bull."},{"issue":"3","key":"5_CR11","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1207\/s15516709cog0000_62","volume":"30","author":"RE N\u00fa\u00f1ez","year":"2006","unstructured":"N\u00fa\u00f1ez, R.E., Sweetser, E.: With the future behind them: convergent evidence from aymara language and gesture in the crosslinguistic comparison of spatial construals of time. Cogn. Sci. 30(3), 401\u2013450 (2006)","journal-title":"Cogn. Sci."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Perak, B.: The role of the metonymy and metaphor in the conceptualization of nation. an emergent ontological analysis of syntactic-semantic constructions. In: Metaphors in the Discourse of the National. John Benjamins (2019)","DOI":"10.1075\/dapsac.82.10per"},{"key":"5_CR13","unstructured":"Perak, B., D\u2019Alessio, S.P.: Culture as an emergent property of the embodied cognition. In: Avanture kulture: kulturalni studiji u lokalnom kontekstu. Jesenski i Turk (2013)"},{"key":"5_CR14","unstructured":"Rovelli, C.: The Order of Time. Riverhead Books (2019)"},{"key":"5_CR15","unstructured":"Schilpp, P.A., G\u00f6del, K.: A remark about the relationship between relativity theory and idealistic philosophy (1949)"},{"key":"5_CR16","unstructured":"Urquiza, A.A., et al.: Resource-bounded intruders in denial of service attacks. In: 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), pp. 382\u201338214. IEEE (2019)"}],"container-title":["Lecture Notes in Computer Science","Logic, Language, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62077-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T12:06:18Z","timestamp":1603886778000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62077-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030620769","9783030620776"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62077-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}