{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:41:11Z","timestamp":1742913671967,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642386121"},{"type":"electronic","value":"9783642386138"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38613-8_28","type":"book-chapter","created":{"date-parts":[[2013,5,13]],"date-time":"2013-05-13T02:45:19Z","timestamp":1368413119000},"page":"412-427","source":"Crossref","is-referenced-by-count":14,"title":["Broadcast, Denial-of-Service, and Secure Communication"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Vigo","sequence":"first","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Lee, E.A.: Cyber Physical Systems: Design Challenges. In: Int. Symp. on Object\/Component\/Service-Oriented Real-Time Distributed Computing (2008)","DOI":"10.1109\/ISORC.2008.25"},{"key":"28_CR2","unstructured":"Neuman, C.: Challenges in Security for Cyber-Physical Systems. In: DHS Workshop on Future Directions in Cyber-Physical Systems Security (2009)"},{"key":"28_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-642-35861-6_12","volume-title":"Formal Aspects of Component Software","author":"H.R. Nielson","year":"2013","unstructured":"Nielson, H.R., Nielson, F., Vigo, R.: A Calculus for Quality. In: P\u0103s\u0103reanu, C.S., Sala\u00fcn, G. (eds.) FACS 2012. LNCS, vol.\u00a07684, pp. 188\u2013204. Springer, Heidelberg (2013)"},{"issue":"2-3","key":"28_CR4","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0167-6423(95)00017-8","volume":"25","author":"K. Prasad","year":"1995","unstructured":"Prasad, K.: A calculus of broadcasting systems. Science of Computer Programming\u00a025(2-3), 285\u2013327 (1995)","journal-title":"Science of Computer Programming"},{"issue":"1-2","key":"28_CR5","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.tcs.2006.08.036","volume":"367","author":"S. Nanz","year":"2006","unstructured":"Nanz, S., Hankin, C.: A framework for security analysis of mobile wireless networks. Theoretical Computer Science\u00a0367(1-2), 203\u2013227 (2006)","journal-title":"Theoretical Computer Science"},{"issue":"2","key":"28_CR6","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.ic.2007.11.010","volume":"207","author":"M. Merro","year":"2009","unstructured":"Merro, M.: An Observational Theory for Mobile Ad Hoc Networks. Inf. Comput.\u00a0207(2), 194\u2013208 (2009)","journal-title":"Inf. Comput."},{"issue":"4","key":"28_CR7","doi-asserted-by":"crossref","first-page":"375","DOI":"10.3233\/FI-2010-371","volume":"105","author":"F. Ghassemi","year":"2010","unstructured":"Ghassemi, F., Fokkink, W., Movaghar, A.: Equational Reasoning on Mobile Ad Hoc Networks. Fundamenta Informaticae\u00a0105(4), 375\u2013415 (2010)","journal-title":"Fundamenta Informaticae"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-02053-7_6","volume-title":"Coordination Models and Languages","author":"J.C.. Godskesen","year":"2009","unstructured":"Godskesen, J.C., Nanz, S.: Mobility Models and Behavioural Equivalence for Wireless Networks. In: Field, J., Vasconcelos, V.T. (eds.) COORDINATION 2009. LNCS, vol.\u00a05521, pp. 106\u2013122. Springer, Heidelberg (2009)"},{"issue":"19","key":"28_CR9","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1016\/j.tcs.2010.01.023","volume":"411","author":"I. Lanese","year":"2010","unstructured":"Lanese, I., Sangiorgi, D.: An operational semantics for a calculus for wireless systems. Theoretical Computer Science\u00a0411(19), 1928\u20131948 (2010)","journal-title":"Theoretical Computer Science"},{"issue":"47","key":"28_CR10","doi-asserted-by":"publisher","first-page":"6585","DOI":"10.1016\/j.tcs.2011.07.016","volume":"412","author":"M. Merro","year":"2011","unstructured":"Merro, M., Ballardin, F., Sibilio, E.: A timed calculus for wireless systems. Theoretical Computer Science\u00a0412(47), 6585\u20136611 (2011)","journal-title":"Theoretical Computer Science"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Bugliesi, M., Gallina, L., Marin, A., Rossi, S., Hamadou, S.: Interference-Sensitive Preorders for MANETs. In: 9th Int. Conf. on Quantitative Evaluation of Systems (QEST), pp. 189\u2013198 (2012)","DOI":"10.1109\/QEST.2012.15"},{"issue":"6","key":"28_CR12","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1016\/j.scico.2009.07.008","volume":"75","author":"A. Singh","year":"2010","unstructured":"Singh, A., Ramakrishnan, C., Smolka, S.A.: A process calculus for Mobile Ad Hoc Networks. Science of Computer Programming\u00a075(6), 440\u2013469 (2010)","journal-title":"Science of Computer Programming"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Song, L., Godskesen, J.C.: Probabilistic Mobility Models for Mobile and Wireless Networks. In: Theoretical Computer Science - 6th IFIP Int. Conf., pp. 86\u2013100 (2010)","DOI":"10.1007\/978-3-642-15240-5_7"},{"key":"28_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-642-21461-5_14","volume-title":"Formal Techniques for Distributed Systems","author":"D. Kouzapas","year":"2011","unstructured":"Kouzapas, D., Philippou, A.: A Process Calculus for Dynamic Networks. In: Bruni, R., Dingel, J. (eds.) FORTE 2011 and FMOODS 2011. LNCS, vol.\u00a06722, pp. 213\u2013227. Springer, Heidelberg (2011)"},{"key":"28_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-540-72794-1_8","volume-title":"Coordination Models and Languages","author":"J.C.. Godskesen","year":"2007","unstructured":"Godskesen, J.C.: A Calculus for Mobile Ad Hoc Networks. In: Murphy, A.L., Vitek, J. (eds.) COORDINATION 2007. LNCS, vol.\u00a04467, pp. 132\u2013150. Springer, Heidelberg (2007)"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: ACM Symp. on Principles of Programming Languages (POPL), pp. 104\u2013115 (2001)","DOI":"10.1145\/373243.360213"},{"key":"28_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-3-642-28891-3_36","volume-title":"NASA Formal Methods","author":"D. Macedonio","year":"2012","unstructured":"Macedonio, D., Merro, M.: A Semantic Analysis of Wireless Network Security Protocols. In: Goodloe, A.E., Person, S. (eds.) NFM 2012. LNCS, vol.\u00a07226, pp. 403\u2013417. Springer, Heidelberg (2012)"},{"key":"28_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-24690-6_7","volume-title":"Software Engineering and Formal Methods","author":"J. Borgstr\u00f6m","year":"2011","unstructured":"Borgstr\u00f6m, J., Huang, S., Johansson, M., Raabjerg, P., Victor, B., \u00c5man Pohjola, J., Parrow, J.: Broadcast Psi-calculi with an Application to Wireless Protocols. In: Barthe, G., Pardo, A., Schneider, G. (eds.) SEFM 2011. LNCS, vol.\u00a07041, pp. 74\u201389. Springer, Heidelberg (2011)"},{"issue":"3-4","key":"28_CR19","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10207-004-0036-x","volume":"2","author":"M. Buchholtz","year":"2004","unstructured":"Buchholtz, M., Nielson, H.R., Nielson, F.: A Calculus for Control Flow Analysis of Security Protocols. Int. J. of Information Security\u00a02(3-4), 145\u2013167 (2004)","journal-title":"Int. J. of Information Security"},{"issue":"1-2","key":"28_CR20","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.jlap.2005.09.008","volume":"67","author":"A. Verdejo","year":"2006","unstructured":"Verdejo, A., Mart\u00ed-Oliet, N.: Executable structural operational semantics in Maude. Journal of Logic and Algebraic Programming\u00a067(1-2), 226\u2013293 (2006)","journal-title":"Journal of Logic and Algebraic Programming"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press (1998)","DOI":"10.1017\/CBO9781139172752"},{"key":"28_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-45789-5_25","volume-title":"Static Analysis","author":"B. Blanchet","year":"2002","unstructured":"Blanchet, B.: From Secrecy to Authenticity in Security Protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, p. 342. Springer, Heidelberg (2002)"},{"key":"28_CR23","unstructured":"Clavel, M., Dur\u00e1n, F., Eker, S., Lincoln, P., Mart\u00ed-Oliet, N., Meseguer, J., Talcott, C.: Maude Manual, Version 2.6 (2011)"},{"issue":"7","key":"28_CR24","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/TMC.2010.36","volume":"9","author":"T. Shu","year":"2010","unstructured":"Shu, T., Liu, S., Krunz, M.: Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes. IEEE Transactions on Mobile Computing\u00a09(7), 941\u2013954 (2010)","journal-title":"IEEE Transactions on Mobile Computing"}],"container-title":["Lecture Notes in Computer Science","Integrated Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38613-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T17:15:16Z","timestamp":1676654116000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-38613-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642386121","9783642386138"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38613-8_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}