{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:12:41Z","timestamp":1742965961190,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642287619"},{"type":"electronic","value":"9783642287626"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28762-6_19","type":"book-chapter","created":{"date-parts":[[2012,3,8]],"date-time":"2012-03-08T11:50:52Z","timestamp":1331207452000},"page":"155-162","source":"Crossref","is-referenced-by-count":5,"title":["Modelling Cryptographic Keys in Dynamic Epistemic Logic with DEMO"],"prefix":"10.1007","author":[{"given":"Hans","family":"van Ditmarsch","sequence":"first","affiliation":[]},{"given":"Jan","family":"van Eijck","sequence":"additional","affiliation":[]},{"given":"Ignacio","family":"Hern\u00e1ndez-Ant\u00f3n","sequence":"additional","affiliation":[]},{"given":"Floor","family":"Sietsma","sequence":"additional","affiliation":[]},{"given":"Sunil","family":"Simon","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Soler-Toscano","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s11229-010-9765-8","volume":"177","author":"F. Dechesne","year":"2010","unstructured":"Dechesne, F., Wang, Y.: To know or not to know: epistemic approaches to security protocol verification. Synthese\u00a0177, 51\u201376 (2010)","journal-title":"Synthese"},{"key":"19_CR2","series-title":"Synthese Library","volume-title":"Dynamic Epistemic Logic","author":"H. van Ditmarsch","year":"2007","unstructured":"van Ditmarsch, H., van der Hoek, W., Kooi, B.: Dynamic Epistemic Logic. Synthese Library, vol.\u00a0337. Springer, Heidelberg (2007)"},{"key":"19_CR3","unstructured":"van Eijck, J.: DEMO \u2014 a demo of epistemic modelling. In: van Benthem, J., Gabbay, D., L\u00f6we, B. (eds.) Interactive Logic \u2014 Proceedings of the 7th Augustus de Morgan Workshop. Texts in Logic and Games, vol.\u00a01, pp. 305\u2013363. Amsterdam University Press (2007)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-540-40981-6_11","volume-title":"Formal Aspects of Security","author":"J.Y. Halpern","year":"2003","unstructured":"Halpern, J.Y., Pucella, R.: Modeling Adversaries in a Logic for Security Protocol Analysis. In: Abdallah, A.E., Ryan, P.Y.A., Schneider, S. (eds.) FASec 2002. LNCS, vol.\u00a02629, pp. 115\u2013132. Springer, Heidelberg (2003)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Ramanujam, R., Suresh, S.P.: Information based reasoning about security protocols. Electr. Notes Theor. Comput. Sci.\u00a055(1) (2001)","DOI":"10.1016\/S1571-0661(04)00246-4"},{"issue":"2","key":"19_CR6","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"}],"container-title":["Advances in Intelligent and Soft Computing","Highlights on Practical Applications of Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28762-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T00:28:35Z","timestamp":1676766515000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-28762-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642287619","9783642287626"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28762-6_19","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2012]]}}}