{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:08:45Z","timestamp":1725757725026},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319037790"},{"type":"electronic","value":"9783319037806"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03780-6_19","type":"book-chapter","created":{"date-parts":[[2013,11,21]],"date-time":"2013-11-21T01:13:18Z","timestamp":1384996398000},"page":"214-225","source":"Crossref","is-referenced-by-count":0,"title":["An Extended Strange Planet Protocol"],"prefix":"10.1007","author":[{"given":"Jin","family":"Liu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhenhua","family":"Duan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cong","family":"Tian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Tian, C., Duan, Z., Liu, J.: Secure Communication with Strange Planet Protocol. Optimization Letters, 1\u20139 (2012)","key":"19_CR1","DOI":"10.1007\/s11590-012-0561-x"},{"unstructured":"Holzmann, G.J.: Design and Validation of Computer Protocols. Pretentice Hall (1991) ISBN 0-13-539925-4","key":"19_CR2"},{"unstructured":"Perlman, R.: Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, 2nd edn. Addison-Wesley (1999) ISBN 0-201-63448-1","key":"19_CR3"},{"unstructured":"Comer, D.E.: Internetworking with TCP\/IP - Principles, 4th edn. Protocols and Architecture. Prentice Hall (2000) ISBN 0-13-018380-6","key":"19_CR4"},{"unstructured":"Agrawal, D.P., Zeng, Q.-A.: Introduction to Wireless and Mobile Systems, 2nd edn. Thomson (April 2005) ISBN. 978-0534493035","key":"19_CR5"},{"doi-asserted-by":"crossref","unstructured":"Hopcroft, J.E., Motwani, R., Ullman J.D.: Introduction to Automata Theory, Languages, and Computation, 2nd edn. Pearson Education (2000) ISBN 0-201-44124-1","key":"19_CR6","DOI":"10.1145\/568438.568455"},{"key":"19_CR7","volume-title":"Discrete mathematics and its applications","author":"K.H. Rosen","year":"1999","unstructured":"Rosen, K.H., Krithivasan, K.: Discrete mathematics and its applications. McGraw-Hill, New York (1999)"}],"container-title":["Lecture Notes in Computer Science","Combinatorial Optimization and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03780-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T09:00:01Z","timestamp":1558688401000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03780-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319037790","9783319037806"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03780-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}