{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:51:13Z","timestamp":1725519073796},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540876977"},{"type":"electronic","value":"9783540876984"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-87698-4_34","type":"book-chapter","created":{"date-parts":[[2008,9,19]],"date-time":"2008-09-19T15:53:29Z","timestamp":1221839609000},"page":"415-428","source":"Crossref","is-referenced-by-count":3,"title":["Formal Security Analysis of Electronic Software Distribution Systems"],"prefix":"10.1007","author":[{"given":"Monika","family":"Maidl","sequence":"first","affiliation":[]},{"given":"David","family":"von Oheimb","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Hartmann","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Robinson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Aided Verification","author":"A. Armando","year":"2005","unstructured":"Armando, A., von Oheimb, D., et al.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576. Springer, Heidelberg (2005)"},{"key":"34_CR2","unstructured":"AVISPA project homepage (2005), \n                    \n                      http:\/\/www.avispa-project.org\/"},{"key":"34_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-45789-5_25","volume-title":"Static Analysis","author":"B. Blanchet","year":"2002","unstructured":"Blanchet, B.: From Secrecy to Authenticity in Security Protocols. In: Hermenegildo, M., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 342\u2013359. Springer, Heidelberg (2002)"},{"issue":"3","key":"34_CR4","doi-asserted-by":"crossref","first-page":"347","DOI":"10.3233\/JCS-2005-13302","volume":"13","author":"C. Bodei","year":"2005","unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, H.R., Nielson, F.: Static validation of security protocols. Journal of Computer Security\u00a013(3), 347\u2013390 (2005)","journal-title":"Journal of Computer Security"},{"key":"34_CR5","unstructured":"Common Criteria, \n                    \n                      http:\/\/www.commoncriteriaportal.org\/"},{"issue":"2","key":"34_CR6","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"34_CR7","unstructured":"Hartmann, P., Tappe, J., von Oheimb, D.: Asset Signer Verifier Protection Profile, Available upon request (2008)"},{"key":"34_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-540-75101-4_3","volume-title":"Computer Safety, Reliability, and Security","author":"R. Robinson","year":"2007","unstructured":"Robinson, R., Li, M., Lintelman, S., Sampigethaya, K., Poovendran, R., von Oheimb, D., Bu\u00dfer, J., Cuellar, J.: Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol.\u00a04680, pp. 28\u201339. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87698-4_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T06:03:02Z","timestamp":1551592982000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87698-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540876977","9783540876984"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87698-4_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}