{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:22:26Z","timestamp":1725556946174},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642135941"},{"type":"electronic","value":"9783642135958"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13595-8_4","type":"book-chapter","created":{"date-parts":[[2010,5,31]],"date-time":"2010-05-31T04:15:17Z","timestamp":1275279317000},"page":"20-31","source":"Crossref","is-referenced-by-count":0,"title":["A UML 2.0 Profile to Model Block Cipher Algorithms"],"prefix":"10.1007","author":[{"given":"Tom\u00e1s","family":"Balderas-Contreras","sequence":"first","affiliation":[]},{"given":"Gustavo","family":"Rodriguez-Gomez","sequence":"additional","affiliation":[]},{"given":"Ren\u00e9","family":"Cumplido","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"3rd Generation Partnership Program: Universal Mobile Telecommunications System (UMTS), Specification of the 3GPP confidentiality and integrity algorithms, Document 2: Kasumi specification (3GPP TS 35.202 version 7.0.0 Release 7) (2007)"},{"key":"4_CR2","volume-title":"A Prescription for Electronic System-Level Methodology","author":"B. Bailey","year":"2007","unstructured":"Bailey, B., Martin, G., Piziali, A.: ESL Design and Verification. In: A Prescription for Electronic System-Level Methodology, Morgan Kaufmann, San Francisco (2007)"},{"key":"4_CR3","volume-title":"20th IEEE Norchip Conference","author":"D. Bj\u00f6rklund","year":"2002","unstructured":"Bj\u00f6rklund, D., Lilius, J.: From UML Behavioral Descriptions to Efficient Synthesizable VHDL. In: 20th IEEE Norchip Conference. IEEE, Copenhagen (2002)"},{"key":"4_CR4","unstructured":"Balderas-Contreras, T., Cumplido, R.: An Efficient FPGA Architecture for Block Ciphering in Third Generation Cellular Network. In: Technical Conference of The International Embedded Solutions Event, Santa Clara, California (2004)"},{"key":"4_CR5","first-page":"240","volume-title":"42nd Annual ACM IEEE Design Automation Conference","author":"T. Balderas-Contreras","year":"2005","unstructured":"Balderas-Contreras, T., Cumplido, R.: High Performance Encryption Cores for 3G Networks. In: 42nd Annual ACM IEEE Design Automation Conference, pp. 240\u2013243. ACM, New York (2005)"},{"issue":"3","key":"4_CR6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MM.2005.56","volume":"25","author":"M.J. Flynn","year":"2005","unstructured":"Flynn, M.J., Hung, P.: Microprocessor Design Issues: Thoughts on the Road Ahead. IEEE Micro\u00a025(3), 16\u201331 (2005)","journal-title":"IEEE Micro"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-47884-1_16","volume-title":"Integrated Formal Methods","author":"S. Kent","year":"2002","unstructured":"Kent, S.: Model Driven Engineering. In: Butler, M., Petre, L., Sere, K. (eds.) IFM 2002. LNCS, vol.\u00a02335, pp. 286\u2013298. Springer, Heidelberg (2002)"},{"key":"4_CR8","unstructured":"Object Management Group: OMG Unified Modeling Language (OMG UML) Superstructure V2.1.2. OMG Document Number: formal\/2007-11-02 (2007)"},{"key":"4_CR9","unstructured":"Picek, R., Strahonja, V.: Model Driven Development - Future or Failure of Software Development? In: Conference on Information and Intelligent Systems, Croatia (2007)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Riccobene, E., Scandura, P., Rosti, A., Bocchio, S.: A UML 2.0 Profile for SystemC. Technical report, ST Microelectronics (2005)","DOI":"10.1145\/1086228.1086254"},{"key":"4_CR11","unstructured":"Semiconductor Industry Association: International Technology Roadmap for Semiconductors. Design Chapter (2007)"}],"container-title":["Lecture Notes in Computer Science","Modelling Foundations and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13595-8_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:40:41Z","timestamp":1606185641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13595-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642135941","9783642135958"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13595-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}