{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:09:14Z","timestamp":1725804554851},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118505"},{"type":"electronic","value":"9783319118512"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11851-2_17","type":"book-chapter","created":{"date-parts":[[2014,9,6]],"date-time":"2014-09-06T10:55:22Z","timestamp":1410000922000},"page":"204-208","source":"Crossref","is-referenced-by-count":6,"title":["Efficient Java Code Generation of Security Protocols Specified in AnB\/AnBx"],"prefix":"10.1007","author":[{"given":"Paolo","family":"Modesti","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s00165-012-0269-9","volume":"26","author":"M. Avalle","year":"2014","unstructured":"Avalle, M., Pironti, A., Sisto, R.: Formal verification of security protocol implementations: a survey. Formal Aspects of Computing\u00a026(1), 99\u2013123 (2014)","journal-title":"Formal Aspects of Computing"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"M\u00f6dersheim, S.: Algebraic properties in Alice and Bob notation. In: International Conference on Availability, Reliability and Security (ARES 2009), pp. 433\u2013440 (2009)","DOI":"10.1109\/ARES.2009.95"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1016\/j.tcs.2007.09.005","volume":"389","author":"S. Briais","year":"2007","unstructured":"Briais, S., Nestmann, U.: A formal semantics for protocol narrations. Theoretical Computer Science\u00a0389, 484\u2013511 (2007), doi:10.1016\/j.tcs.2007.09.005","journal-title":"Theoretical Computer Science"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-642-16074-5_12","volume-title":"Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security","author":"M. Bugliesi","year":"2010","unstructured":"Bugliesi, M., Modesti, P.: AnBx - Security Protocols Design and Verification. In: Armando, A., Lowe, G. (eds.) ARSPA-WITS 2010. LNCS, vol.\u00a06186, pp. 164\u2013184. Springer, Heidelberg (2010)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Modesti, P.: Effcient Java code generation of security protocols specified in AnB\/AnBx. Technical Report CS-TR-1422, Newcastle University (2014)","DOI":"10.1007\/978-3-319-11851-2_17"},{"issue":"3","key":"17_CR6","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D. Basin","year":"2005","unstructured":"Basin, D., M\u00f6dersheim, S., Vigan\u00f2, L.: OFMC: A symbolic model checker for security protocols. Int. Journal of Information Security\u00a04(3), 181\u2013208 (2005)","journal-title":"Int. Journal of Information Security"},{"key":"17_CR7","unstructured":"P. Modesti: Verified Security Protocol Modeling and Implementation with AnBx. PhD thesis, Universit\u00e0 Ca\u2019 Foscari Venezia, Italy (2012)"},{"issue":"1","key":"17_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10817-005-9018-6","volume":"36","author":"G. Bella","year":"2006","unstructured":"Bella, G., Massacci, F., Paulson, L.C.: Verifying the SET purchase protocols. Journal of Automated Reasoning\u00a036(1), 5\u201337 (2006)","journal-title":"Journal of Automated Reasoning"},{"issue":"4","key":"17_CR9","first-page":"611","volume":"18","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., et al.: Design, implementation, and deployment of the iKP secure electronic payment system. IEEE JSAC\u00a018(4), 611\u2013627 (2000)","journal-title":"IEEE JSAC"},{"key":"17_CR10","unstructured":"Pozza, D., Sisto, R., Durante, L.: Spi2Java: Automatic cryptographic protocol Java code generation from spi calculus. In: Proceedings of the 18th AINA. IEEE (2004)"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-642-28891-3_34","volume-title":"NASA Formal Methods","author":"M. Backes","year":"2012","unstructured":"Backes, M., Busenius, A., Hri\u0163cu, C.: On the development and formalization of an extensible code generator for real life security protocols. In: Goodloe, A.E., Person, S. (eds.) NFM 2012. LNCS, vol.\u00a07226, pp. 371\u2013387. Springer, Heidelberg (2012)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Tobler, B., Hutchison, A.: Generating network security protocol implementations from formal specifications. Cert. and Security in Inter-Org. E-Service, 33\u201354 (2005)","DOI":"10.1007\/11397427_3"},{"key":"17_CR13","unstructured":"Millen, J., Muller, F.: Cryptographic protocol generation from CAPSL. Technical Report SRI-CSL-01-07, SRI International (2001)"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11851-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T18:46:18Z","timestamp":1565808378000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11851-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118505","9783319118512"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11851-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}