{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:28:34Z","timestamp":1761974914978,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642384561"},{"type":"electronic","value":"9783642384578"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38457-8_5","type":"book-chapter","created":{"date-parts":[[2013,5,7]],"date-time":"2013-05-07T00:57:34Z","timestamp":1367888254000},"page":"52-63","source":"Crossref","is-referenced-by-count":3,"title":["Protocol Verification in a Theory of Action"],"prefix":"10.1007","author":[{"given":"Aaron","family":"Hunter","sequence":"first","affiliation":[]},{"given":"James P.","family":"Delgrande","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"McBride","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/3-540-45628-7_20","volume-title":"Computational Logic: Logic Programming and Beyond","author":"L.C. Aiello","year":"2002","unstructured":"Aiello, L.C., Massacci, F.: Planning attacks to security protocols: Case studies in logic programming. In: Kakas, A.C., Sadri, F. (eds.) Computat. Logic (Kowalski Festschrift). LNCS (LNAI), vol.\u00a02407, pp. 533\u2013560. Springer, Heidelberg (2002)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Armando, A., Compagna, L., Lierler, Y.: Automatic Compilation of Protocol Insecurity Problems into Logic Programming. In: Proceedings of JELIA, pp. 617\u2013627 (2004)","DOI":"10.1007\/978-3-540-30227-8_51"},{"key":"5_CR3","unstructured":"Brackin, S., Meadows, C., Millen, J.: CAPSL Interface for the NRL Protocol Analyzer. In: Proceedings of ASSET 1999. IEEE Press (1999)"},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"issue":"29","key":"5_CR5","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"2","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. IEEE Trans. on Inf. Theory\u00a02(29), 198\u2013208 (1983)","journal-title":"IEEE Trans. on Inf. Theory"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y.: Reasoning about Knowledge. The MIT Press (1995)","DOI":"10.7551\/mitpress\/5803.001.0001"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Halpern, J.Y., Pucella, R.: On the Relationship between Strand Spaces and Multi-Agent Systems, CoRR, cs.CR\/0306107 (2003)","DOI":"10.1145\/605434.605436"},{"key":"5_CR8","first-page":"57","volume":"143","author":"J. Hern\u00e1ndez-Orallo","year":"2000","unstructured":"Hern\u00e1ndez-Orallo, J., Pinto, J.: Especificaci\u00f3n formal de protocolos criptogr\u00e1ficos en C\u00e1lculo de Situaciones. Novatica\u00a0143, 57\u201363 (2000)","journal-title":"Novatica"},{"key":"5_CR9","unstructured":"Hunter, A., Delgrande, J.: Belief Change and Cryptographic Protocol Verification. In: Proceedings of AAAI (2007)"},{"key":"5_CR10","unstructured":"Levesque, H.J., Pirri, F., Reiter, R.: Foundations for the Situation Calculus. Link\u00f6ping Electronic Articles in Computer and Information Science\u00a03(18) (1998)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Levesque, H.J., Raymond, R., Lesperance, Y., Lin, F., Scherl, R.: GOLOG: A Logic Programming Language for Dynamic Domains. Journal of Logic Programming\u00a0(31), 1\u20133 (1997)","DOI":"10.1016\/S0743-1066(96)00121-5"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"issue":"2-3","key":"5_CR13","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"J. Thayer","year":"1999","unstructured":"Thayer, J., Herzog, J., Guttman, J.: Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security\u00a07(2-3), 191\u2013230 (1999)","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38457-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T08:48:32Z","timestamp":1746002912000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38457-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642384561","9783642384578"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38457-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}