{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:55:31Z","timestamp":1743126931771,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319065687"},{"type":"electronic","value":"9783319065694"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06569-4_29","type":"book-chapter","created":{"date-parts":[[2014,4,11]],"date-time":"2014-04-11T20:16:15Z","timestamp":1397247375000},"page":"389-403","source":"Crossref","is-referenced-by-count":0,"title":["Formal Security Verification of Transport Protocols for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Vinh-Thong","family":"Ta","sequence":"first","affiliation":[]},{"given":"Amit","family":"Dvir","sequence":"additional","affiliation":[]},{"given":"Levente","family":"Butty\u00e1n","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Dvir, A., Butty\u00e1n, L., Ta, V.-T.: SDTP+: Securing a distributed transport protocol for wsns using merkle trees and hash chains. In: IEEE International Confenrence on Communications (ICC), Budapest, Hungary, pp. 1\u20136 (June 2013)","DOI":"10.1109\/ICC.2013.6654831"},{"issue":"12","key":"29_CR2","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J. Yicka","year":"2008","unstructured":"Yicka, J., Mukherjeea, B., Ghosal, D.: Wireless sensor network survey. Computer Networks\u00a052(12), 2292\u20132330 (2008)","journal-title":"Computer Networks"},{"issue":"3","key":"29_CR3","first-page":"34","volume":"20","author":"C. Wang","year":"2006","unstructured":"Wang, C., Sohraby, K., Li, B., Daneshmand, M., Hu, Y.: A survey of transport protocols for wireless sensor networks. Network\u00a020(3), 34\u201340 (2006)","journal-title":"Network"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Butty\u00e1n, L., Csik, L.: Security analysis of reliable transport layer protocols for wireless sensor networks. In: IEEE Workshop on Sensor Networks and Systems for Pervasive Computing, Mannheim, Germany, pp. 1\u20136 (March 2010)","DOI":"10.1109\/PERCOMW.2010.5470633"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Marchi, B., Grilo, A., Nunes, M.: DTSN - distributed transport for sensor networks. In: IEEE Symposium on Computers and Communications, Aveiro, Portugal, pp. 165\u2013172 (July 2007)","DOI":"10.1109\/ISCC.2007.4381601"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Butty\u00e1n, L., Grilo, A.M.: A Secure Distributed Transport Protocol for Wireless Sensor Networks. In: IEEE International Conference on Communications, Kyoto, Japan, pp. 1\u20136 (June 2011)","DOI":"10.1109\/icc.2011.5962646"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Ta, V.-T., Dvir, A.: On formal and automatic security verification of wsn transport protocols. ISRN Sensor Networks (December 2013) (accepted)","DOI":"10.1155\/2014\/891467"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: Protocols for Public Key Cryptosystems. In: Symposium on Security and Privacy, California, USA, pp. 122\u2013134 (April 1980)","DOI":"10.1109\/SP.1980.10006"},{"key":"29_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/3-540-36504-4_8","volume-title":"Financial Cryptography","author":"D. Coppersmith","year":"2003","unstructured":"Coppersmith, D., Jakobsson, M.: Almost optimal hash sequence traversal. In: Blaze, M. (ed.) FC 2002. LNCS, vol.\u00a02357, pp. 102\u2013119. Springer, Heidelberg (2003)"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Galuba, W., Papadimitratos, P., Poturalski, M., Aberer, K., Despotovic, Z., Kellerer, W.: Castor: Scalable Secure Routing for Ad-Hoc Networks. In: Infocom, Rio de Janeiro, Brazil, pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5462115"},{"issue":"1-2","key":"29_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s11276-004-4744-y","volume":"11","author":"Y.-C. Hu","year":"2005","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks Journal\u00a011(1-2), 21\u201338 (2005)","journal-title":"Wireless Networks Journal"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Fournet, C., Abadi, M.: Mobile values, new names, and secure communication. In: ACM Symposium on Principles of Programming, pp. 104\u2013115 (2001)","DOI":"10.1145\/373243.360213"},{"key":"29_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-76637-7_12","volume-title":"Programming Languages and Systems","author":"J. Goubault-Larrecq","year":"2007","unstructured":"Goubault-Larrecq, J., Palamidessi, C., Troina, A.: A probabilistic applied pi\u2013calculus. In: Shao, Z. (ed.) APLAS 2007. LNCS, vol.\u00a04807, pp. 175\u2013190. Springer, Heidelberg (2007)"},{"key":"29_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/3-540-61648-9_37","volume-title":"Formal Techniques in Real-Time and Fault-Tolerant Systems","author":"P.R. D\u2019Argenio","year":"1996","unstructured":"D\u2019Argenio, P.R., Brinksma, E.: A calculus for timed automata. In: Jonsson, B., Parrow, J. (eds.) FTRTFT 1996. LNCS, vol.\u00a01135, pp. 110\u2013129. Springer, Heidelberg (1996)"},{"key":"29_CR15","unstructured":"Ta, V.-T., Dvir, A.: On formal and automatic security verification of wsn transport protocols. Cryptology ePrint Archive, Report 2013\/014 (2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computational Methods for Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06569-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T01:50:48Z","timestamp":1676857848000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-06569-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319065687","9783319065694"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06569-4_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}