{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T14:02:26Z","timestamp":1760623346215,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031474507"},{"type":"electronic","value":"9783031474514"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-47451-4_40","type":"book-chapter","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T20:02:04Z","timestamp":1698782524000},"page":"566-573","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Formal Security Analysis of\u00a0Generalized Ultralightweight Mutual Authentication Protocol"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Najam-ul-Islam","sequence":"first","affiliation":[]},{"given":"Madiha","family":"Khalid","sequence":"additional","affiliation":[]},{"given":"Umar","family":"Mujahid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,1]]},"reference":[{"issue":"1","key":"40_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.3390\/s20010084","volume":"20","author":"I Zyrianoff","year":"2019","unstructured":"Zyrianoff, I., et al.: Architecting and deploying IoT smart applications: a performance-oriented approach. Sensors 20(1), 84 (2019)","journal-title":"Sensors"},{"key":"40_CR2","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.future.2019.02.050","volume":"97","author":"WZ Khan","year":"2019","unstructured":"Khan, W.Z., et al.: Edge computing: a survey. Future Gener. Comput. Syst. 97, 219\u2013235 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"40_CR3","doi-asserted-by":"publisher","first-page":"4118","DOI":"10.1109\/JIOT.2018.2875544","volume":"6","author":"B Omoniwa","year":"2018","unstructured":"Omoniwa, B., et al.: Fog\/edge computing-based IoT (FECIoT): architecture, applications, and research issues. IEEE Internet Things J. 6(3), 4118\u20134149 (2018)","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"40_CR4","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang, Y., et al.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4(5), 1250\u20131258 (2017)","journal-title":"IEEE Internet Things J."},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Sicari, S., et al.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"40_CR6","unstructured":"Safkhani, M., Bagheri, N.: Generalized desynchronization attack on UMAP: application to RCIA, KMAP, SLAP and SASI $$^+ $$ protocols. Cryptology ePrint Archive (2016)"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Khalid, M., Mujahid, U., Muhammad, N.I.: Ultralightweight RFID authentication protocols for low-cost passive RFID tags. In: Security and Communication Networks (2019)","DOI":"10.1155\/2019\/3295616"},{"issue":"1","key":"40_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. (TOCS) 8(1), 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R.M., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: IEEE Symposium on Security and Privacy, vol. 1990 (1990)","DOI":"10.1109\/RISP.1990.63854"},{"key":"40_CR10","unstructured":"Casimiro, A., d Lemos, R., Gacek, C.: Operational Semantics and Verification of Security Protocols, Information Security and Cryptography (2012)"},{"issue":"1\u20132","key":"40_CR11","doi-asserted-by":"publisher","first-page":"53","DOI":"10.3233\/JCS-1998-61-204","volume":"6","author":"G Lowe","year":"1998","unstructured":"Lowe, G.: Casper: a compiler for the analysis of security protocols. J. Comput. Secur. 6(1\u20132), 53\u201384 (1998)","journal-title":"J. Comput. Secur."},{"key":"40_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigano","year":"2006","unstructured":"Vigano, L.: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 155, 61\u201386 (2006)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"40_CR13","unstructured":"L\u00f3pez, P.P., Castro, D.D.J.C.H., Garnacho, D.D.A.R.: Lightweight cryptography in radio frequency identification (RFID) systems. Computer Science Department, Carlos III University of Madrid (2008)"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the Future Technologies Conference (FTC) 2023, Volume 2"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47451-4_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T18:08:07Z","timestamp":1713031687000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47451-4_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031474507","9783031474514"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47451-4_40","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FTC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of the Future Technologies Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ftc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/FTC","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}