{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:55:55Z","timestamp":1747810555230,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201755"},{"type":"electronic","value":"9783540399797"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39979-7_16","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T18:52:22Z","timestamp":1277232742000},"page":"240-256","source":"Crossref","is-referenced-by-count":25,"title":["A Lightweight Formal Analysis of a Multicast Key Management Scheme"],"prefix":"10.1007","author":[{"given":"Mana","family":"Taghdiri","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Jackson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Baugher, M., Hardjono, T., Harney, H., Weis, B.: Group domain of interpretation for ISAKMP (2001), http:\/\/search.ietf.org\/internet-drafts\/draft-irtf-smug-gdoi-01.txt"},{"key":"16_CR2","unstructured":"Clarke, E.M., Marrero, W.: Using formal methods for analyzing security. Information Survivability Workshop (ISW) (October 1998)"},{"key":"16_CR3","unstructured":"Guttag, J., Horning, J., Modet, A.: Report on the Larch Shared Language: Version 2.3. Digital Equipment Corporation, Systems Research Center, report 58 (1990)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Holzmann, G.J.: The model checker SPIN. IEEE Transactions on Software Engineering\u00a023(5) (1997)","DOI":"10.1109\/32.588521"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Jackson, D.: Automating first-order relational logic. In: Proc. of the 8th ACM SIGSOFT Symposium on the Foundations of Software Engineering (2000)","DOI":"10.1145\/355045.355063"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Jackson, D., Shlyakhter, I., Sridharan, M.: A micromodularity mechanism. In: Proc. of the joint 8th European Software Engineering Conference and 9th ACM SIGSOFT Symposium on the Foundations of Software Engineering (2001)","DOI":"10.1145\/503209.503219"},{"key":"16_CR7","unstructured":"Jackson, D., Wing, J.: Lightweight formal methods. IEEE Computer (1996)"},{"key":"16_CR8","volume-title":"Systematic Software Development using VDM","author":"C.B. Jones","year":"1990","unstructured":"Jones, C.B.: Systematic Software Development using VDM. Prentice Hall International, Englewood Cliffs (1990)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Meadows, C.: A system for the specification and analysis of key management protocols. In: Proc. of 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 182\u2013195 (1991)","DOI":"10.1109\/RISP.1991.130786"},{"issue":"2","key":"16_CR10","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","volume":"26","author":"C. Meadows","year":"1996","unstructured":"Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming\u00a026(2), 113\u2013131 (1996)","journal-title":"Journal of Logic Programming"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Meadows, C., Syverson, P., Cervesato, I.: Formalizing GDOI group key management requirements in NPATRL. In: Proc. of the 8th ACM Conference on Computer and Communications Security, pp. 235\u2013244 (2001)","DOI":"10.1145\/501983.502016"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Mittra, S.: Iolus: A framework for scalable secure multicasting. In: Proc. of ACM SIGCOMM 1997, pp. 277\u2013288 (1997)","DOI":"10.1145\/263105.263179"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Sato, F., Tanaka, S.: A push-based key distribution and rekeying protocol for secure multicasting. In: Proc. of International Conference on Parallel and Distributed Systems, pp. 214\u2013219 (2001)","DOI":"10.1109\/ICPADS.2001.934822"},{"key":"16_CR14","volume-title":"The Z Notation: A Reference Manual","author":"J.M. Spivey","year":"1992","unstructured":"Spivey, J.M.: The Z Notation: A Reference Manual, 2nd edn. Prentice Hall, Englewood Cliffs (1992)","edition":"2"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Taghdiri, M.: Lightweight modelling and automatic analysis of multicast key management schemes. Master\u2019s thesis, MIT, EECS Department (December 2002)","DOI":"10.1007\/978-3-540-39979-7_16"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Tanaka, S., Sato, F.: A key distribution and rekeying framework with totally ordered multicast protocols. In: Proc. of the 15th International Conf. on Information Networking, pp. 831\u2013838 (2001)","DOI":"10.1109\/ICOIN.2001.905598"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Networked and Distributed Systems - FORTE 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39979-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T04:47:40Z","timestamp":1740199660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39979-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201755","9783540399797"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39979-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}