{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:29:16Z","timestamp":1725870556463},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319387871"},{"type":"electronic","value":"9783319387895"}],"license":[{"start":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T00:00:00Z","timestamp":1478649600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-38789-5_62","type":"book-chapter","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T10:54:56Z","timestamp":1478602496000},"page":"541-551","source":"Crossref","is-referenced-by-count":1,"title":["Modeling and Simulation Strategies of Cryptographic Protocols Based on Finite State Machine"],"prefix":"10.1007","author":[{"given":"Ming-qing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shu-qin","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Hong-shan","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Xiao-hu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,9]]},"reference":[{"key":"62_CR1","doi-asserted-by":"crossref","unstructured":"Meadows C (2011) Formal analysis of cryptographic protocols. Encycl Cryptogr Secur 490\u2013492","DOI":"10.1007\/978-1-4419-5906-5_876"},{"key":"62_CR2","doi-asserted-by":"crossref","unstructured":"Liu S, Ye J (2012) Computational rationality of formal analysis on cryptographic protocols. In: Proceedings of the ICCIS. IEEE, pp 904\u2013907","DOI":"10.1109\/ICCIS.2012.111"},{"key":"62_CR3","doi-asserted-by":"crossref","unstructured":"Meadows C (2015) Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later. Logic, rewriting, and concurrency. Springer International Publishing, New York, pp 475\u2013492","DOI":"10.1007\/978-3-319-23165-5_22"},{"key":"62_CR4","doi-asserted-by":"crossref","unstructured":"Blanchet B (2012) Security protocol verification: symbolic and computational models. In: Proceedings of the POST12. Springer, New York, pp 3\u201329","DOI":"10.1007\/978-3-642-28641-4_2"},{"key":"62_CR5","doi-asserted-by":"crossref","unstructured":"Meier S, Schmidt B, Cremers C et al (2013) The TAMARIN prover for the symbolic analysis of security protocols. Computer aided verification. Springer, Berlin, pp 696\u2013701","DOI":"10.1007\/978-3-642-39799-8_48"},{"key":"62_CR6","doi-asserted-by":"crossref","unstructured":"Pankova A, Laud P (2012) Symbolic analysis of cryptographic protocols containing bilinear pairings. In: Proceedings of CSF. IEEE","DOI":"10.1109\/CSF.2012.10"},{"key":"62_CR7","doi-asserted-by":"crossref","unstructured":"Brand D, Zafiropulo P (1983) On communicating finite-state machines. J ACM (JACM) 30(2):323\u2013342","DOI":"10.1145\/322374.322380"},{"issue":"1","key":"62_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10703-014-0216-x","volume":"46","author":"F Aarts","year":"2014","unstructured":"Aarts F, Jonsson B, Uijen J et al (2014) Generating models of infinite-state communication protocols using regular inference with abstraction. Form Methods Syst Des 46(1):1\u201341","journal-title":"Form Methods Syst Des"},{"key":"62_CR9","unstructured":"Varga A (2014) OMNeT++ user manual version 4.6. http:\/\/www.omnetpp.org\/doc\/omnetpp\/manual.html"},{"key":"62_CR10","doi-asserted-by":"crossref","unstructured":"Kaufman C, Hoffman P, Nir Y et al (2014) Internet key exchange protocol version 2 (IKEv2). IETF","DOI":"10.17487\/rfc7296"},{"key":"62_CR11","doi-asserted-by":"crossref","unstructured":"Kasraoui M, Cabani A, Chafouk H (2014) IKEv2 authentication exchange model in NS-2. In: Proceedings of the IS3C. IEEE, pp 1074\u20131077","DOI":"10.1109\/IS3C.2014.280"},{"key":"62_CR12","doi-asserted-by":"crossref","unstructured":"Patel H, Jinwala D (2013) Modeling and analysis of internet key exchange protocolv2 and a proposal for its variant. In: Proceedings of the 6th ACM India computing convention. ACM","DOI":"10.1145\/2522548.2523132"}],"container-title":["Advances in Intelligent Systems and Computing","Information Technology and Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-38789-5_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,27]],"date-time":"2020-09-27T05:30:21Z","timestamp":1601184621000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-38789-5_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,9]]},"ISBN":["9783319387871","9783319387895"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-38789-5_62","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016,11,9]]}}}