{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:30:15Z","timestamp":1725795015129},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319066851"},{"type":"electronic","value":"9783319066868"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06686-8_18","type":"book-chapter","created":{"date-parts":[[2014,6,2]],"date-time":"2014-06-02T01:30:40Z","timestamp":1401672640000},"page":"232-244","source":"Crossref","is-referenced-by-count":0,"title":["Primal Implication as Encryption"],"prefix":"10.1007","author":[{"given":"Vladimir N.","family":"Krupski","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Gurevich, Y., Neeman, I.: DKAL: Distributed-Knowledge Authorization Language. In: Proc. of CSF 2008, pp. 149\u2013162. IEEE Computer Society (2008)","DOI":"10.1109\/CSF.2008.8"},{"key":"18_CR2","unstructured":"Gurevich, Y., Neeman, I.: DKAL 2 \u2014 A Simplified and Improved Authorization Language. Technical Report MSR-TR-2009-11, Microsoft Research (February 2009)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Gurevich, Y., Neeman, I.: Logic of infons: the propositional case. ACM Transactions on Computational Logic\u00a012(2) (2011)","DOI":"10.1145\/1877714.1877715"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Beklemishev, L., Gurevich, Y.: Propositional primal logic with disjunction. J. of Logic and Computation 22, 26 pages (2012)","DOI":"10.1093\/logcom\/exs018"},{"key":"18_CR5","unstructured":"Cotrini, C., Gurevich, Y.: Basic primal infon logic. Microsoft Research Technical Report MSR-TR-2012-88, Microsoft Research (August 2012)"},{"key":"18_CR6","series-title":"Cambridge Tracts in Theoretical Computer Science","volume-title":"Basic proof theory","author":"A. Troelstra","year":"1996","unstructured":"Troelstra, A., Schwichtenberg, H.: Basic proof theory. Cambridge Tracts in Theoretical Computer Science, vol.\u00a043. Cambridge University Press, Cambridge (1996)"},{"key":"18_CR7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography: Volume 1, Basic Tools","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundations of Cryptography: Volume 1, Basic Tools. Cambridge University Press, Cambridge (2001)"},{"key":"18_CR8","unstructured":"Blum, M.: Coin Flipping by Telephone. In: Proceedings of CRYPTO, pp. 11\u201315 (1981)"}],"container-title":["Lecture Notes in Computer Science","Computer Science - Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06686-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T19:54:25Z","timestamp":1558900465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06686-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319066851","9783319066868"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06686-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}