{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:46:02Z","timestamp":1725497162063},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540754138"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75414-5_16","type":"book-chapter","created":{"date-parts":[[2007,12,6]],"date-time":"2007-12-06T11:22:54Z","timestamp":1196940174000},"page":"247-259","source":"Crossref","is-referenced-by-count":5,"title":["Verifying Security Protocols for Sensor Networks Using Algebraic Specification Techniques"],"prefix":"10.1007","author":[{"given":"Iakovos","family":"Ouranos","sequence":"first","affiliation":[]},{"given":"Petros","family":"Stefaneas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Bj\u00f8rner, D.: Logics of Formal Specification Languages - The Possible Worlds cum Domain Problem. In: Proceedings of 4th Panhellenic Symposium on Logic (2003)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1007\/978-3-540-39958-2_12","volume-title":"Formal Methods for Open Object-Based Distributed Systems","author":"K. Ogata","year":"2003","unstructured":"Ogata, K., Futatsugi, K.: Proof Scores in the OTS\/CafeOBJ Method. In: Najm, E., Nestmann, U., Stevens, P. (eds.) FMOODS 2003. LNCS, vol.\u00a02884, pp. 170\u2013184. Springer, Heidelberg (2003)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1007\/11780274_31","volume-title":"Algebra, Meaning, and Computation","author":"K. Ogata","year":"2006","unstructured":"Ogata, K., Futatsugi, K.: Some Tips on Writing Proof Scores in the OTS\/CafeOBJ Method. In: Futatsugi, K., Jouannaud, J.-P., Meseguer, J. (eds.) Algebra, Meaning, and Computation. LNCS, vol.\u00a04060, pp. 596\u2013615. Springer, Heidelberg (2006)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Diaconescu, R., Futatsugi, K.: CafeOBJ Report. World Scientific, Singapore (1998)","DOI":"10.1142\/3831"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: Proceedings of MOBICOM 2001, pp. 189\u2013199 (2001)","DOI":"10.1145\/381677.381696"},{"key":"16_CR6","unstructured":"Goguen, J., Malcolm, G.: A hidden agenda. Technical Report CS97-538, University of California at San Diego (1997)"},{"key":"16_CR7","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"-29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inform. Theory IT-29, 198\u2013208 (1983)","journal-title":"IEEE Trans. Inform. Theory IT"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Ogata, K., Futatsugi, K.: Rewriting - based verification of authentication protocols. In: WRLA 2002. ENTCS, vol.\u00a071 (2002)","DOI":"10.1016\/S1571-0661(05)82536-8"},{"issue":"2","key":"16_CR9","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.scico.2006.10.011","volume":"66","author":"Kazuhiro Ogata","year":"2007","unstructured":"Ogata, K., Futatsugi, K.: Modeling and Verification of Real-Time Systems Based on Equations. Science of computer programming\u00a066(2), 162\u2013180 (2007)","journal-title":"Science of Computer Programming"},{"key":"16_CR10","unstructured":"Diaconescu, R., Futatsugi, K., Ogata, K.: CafeOBJ: Logical Foundations and Methodologies. Computing and Informatics\u00a022, 1001\u20131025 (2003)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Ogata, K., Futatsugi, K.: Formal analysis of Suzuki and Kasami distributed mutual exclusion algorithm. In: FMOODS 2002, pp. 181\u2013195 (2002)","DOI":"10.1007\/978-0-387-35496-5_13"},{"key":"16_CR12","unstructured":"Seino, T., Ogata, K., Futatsugi, K.: Specification and Verification of a Single-Track Railroad Signaling in CafeOBJ. IEICE Trans. Fundamentals\u00a0E84-A(6), 1471\u20131478 (2001)"},{"key":"16_CR13","unstructured":"Xiang, J., Kong, W., Futatsugi, K., Ogata, K.: Analysis of Positive Incentives for Protecting Secrets in Digital Rights Management. In: WEBIST 2006 (2006)"},{"key":"16_CR14","unstructured":"Ouranos, I. Stefaneas, P., Frangos, P.: A Formal Specification Framework for ad hoc mobile communication networks. In: van Leeuwen, J., Italiano, G.F., van der Hoek, W., Meinel, C., Sack, H., Pl\u00e1\u0161il, F., Bielikova, M. (eds.) SOFSEM 2007, vol. 2, pp. 91\u2013102, Institute of Computer Science AS CR, Prague (2007) ISBN 80-903298-9-6"},{"issue":"9","key":"16_CR15","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1093\/ietfec\/e90-a.9.1986","volume":"E90-A","author":"I. OURANOS","year":"2007","unstructured":"Ouranos, I., Stefaneas, P., Frangos, P.: An Algebraic Framework for Modeling of Mobile Systems. IEICE Trans. Fundamentals E90-A(9) (to appear, 2007)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"}],"container-title":["Lecture Notes in Computer Science","Algebraic Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75414-5_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T04:36:14Z","timestamp":1684125374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75414-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540754138"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75414-5_16","relation":{},"subject":[]}}