{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:31:15Z","timestamp":1742934675430,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319607160"},{"type":"electronic","value":"9783319607177"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60717-7_2","type":"book-chapter","created":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T10:58:10Z","timestamp":1502189890000},"page":"12-21","source":"Crossref","is-referenced-by-count":1,"title":["CPN Based Analysis of In-Vehicle Secure Communication Protocol"],"prefix":"10.1007","author":[{"given":"Rustam Rakhimov","family":"Igorevich","sequence":"first","affiliation":[]},{"given":"Daekyo","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Dugki","family":"Min","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,9]]},"reference":[{"key":"2_CR1","unstructured":"Jensen, K.: A brief introduction to colored petri nets. In: Workshop on the Applicability of Formal Models, Aarhus, Denmark, pp. 55\u201358, 2 June 1998"},{"key":"2_CR2","unstructured":"Jensen, K.: An introduction to the theoretical aspects of colored petri nets. In: Workshop on the Applicability of Formal Models, Aarhus, Denmark (1998)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Long, S.: Analysis of concurrent security protocols using colored petri nets. In: 2009 International Conference on Networking and Digital Society (2009)","DOI":"10.1109\/ICNDS.2009.62"},{"key":"2_CR4","unstructured":"Basyouni, A.M.: Analysis of wireless cryptographic protocols. Master\u2019s thesis, Queen\u2019s University Kingston, Ontario, Canada (1997)"},{"key":"2_CR5","unstructured":"Moon, H.: A study on formal specification and analysis of cryptographic protocols using colored petri nets. Master\u2019s thesis, Kwangju Institute of Science and Technology, Korea (1998)"},{"key":"2_CR6","unstructured":"www.cpntools.org \u2013 CPN Tools Homepage"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Basyouni, A.M., Tavares, S.E.: New approach to cryptographic protocol analysis using coloured petri nets. Queen\u2019s University Kingston, Ontario (1997)","DOI":"10.1109\/CCECE.1997.614857"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Sornkhom, P., Permpoontanalarp, Y.: Security analysis of Micali\u2019s fair contract signing protocol by using coloured petri nets. In: Proceedings of 9th ACIS International Conference Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing, SNPD (2008)","DOI":"10.1109\/SNPD.2008.30"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Seifi, Y., Suriadi, S., Foo, E., Boyd, C.: Analysis of two authorization protocols using colored petri nets. Int. J. Inf. Secur. (2014)","DOI":"10.1007\/s10207-014-0243-z"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-642-12459-4_15","volume-title":"Formal Aspects in Security and Trust","author":"L Chen","year":"2010","unstructured":"Chen, L., Ryan, M.: Attack, solution and verification for shared authorisation data in TCG TPM. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 201\u2013216. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-12459-4_15"},{"issue":"2","key":"2_CR11","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality, Reliability, Security and Robustness in Heterogeneous Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60717-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:04:20Z","timestamp":1569974660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60717-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319607160","9783319607177"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60717-7_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}