{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:30:03Z","timestamp":1742977803077,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642257247"},{"type":"electronic","value":"9783642257254"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25725-4_7","type":"book-chapter","created":{"date-parts":[[2011,12,9]],"date-time":"2011-12-09T14:39:34Z","timestamp":1323441574000},"page":"75-86","source":"Crossref","is-referenced-by-count":1,"title":["Reasoning about DNSSEC"],"prefix":"10.1007","author":[{"given":"Kollapalli Ramesh","family":"Babu","sequence":"first","affiliation":[]},{"given":"Vineet","family":"Padmanabhan","sequence":"additional","affiliation":[]},{"given":"Wilson Naik","family":"Bhukya","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Tuttle, M.: A semantics for a logic of authentication. In: Proceedings of the ACM Symposium of Principles of Distributed Computing, pp. 201\u2013216. ACM Press (1991)","DOI":"10.1145\/112600.112618"},{"key":"7_CR2","unstructured":"Albitz, P., Liu, C.: DNS and BIND, 4th edn. O\u2019Reilly (April 2001)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: Dns security introduction and requirements. RFC 4033, Internet Engineering Task Force, 1 (March 2005)","DOI":"10.17487\/rfc4033"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: Resource records for the dns security extensions. RFC 4034, Internet Engineering Task Force, 1 (March 2005)","DOI":"10.17487\/rfc4034"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Ariyapperuma, S., Mitchell, C.J.: Security vulnerabilities in dns and dnssec. In: ARES, pp. 335\u2013342 (2007)","DOI":"10.1109\/ARES.2007.139"},{"issue":"1","key":"7_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. ACM Trans. Comput. Syst.\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Fagin, R., Halpern, J., Moses, Y., Vardi, M.: Reasoning about knowledge. MIT Press (1995)","DOI":"10.7551\/mitpress\/5803.001.0001"},{"key":"7_CR8","unstructured":"Huston, G.: Dnssec - the theory. The ISP Column, 1 (August 2006)"},{"key":"7_CR9","unstructured":"Mathuria, A.M., Safavi-naini, R., Nickolas, P.R.: On the automation of gny logic. In: Proceedings of the 18th Australian Computer Science Conference, pp. 370\u2013379 (1995)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Syverson, P.F., Van Oorschot, P.C.: A unified cryptographic protocol logic. Technical report, NRL Publication 5540-227, Naval Research Lab (1996)","DOI":"10.21236\/ADA464967"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"van Oorschot, P.: Extending cryptographic logics of belief to key agreement protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, CCS 1993, pp. 232\u2013243. ACM (1993)","DOI":"10.1145\/168588.168617"}],"container-title":["Lecture Notes in Computer Science","Multi-disciplinary Trends in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25725-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T10:54:14Z","timestamp":1742036054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25725-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642257247","9783642257254"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25725-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}