{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:37Z","timestamp":1725771277900},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_17","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"192-201","source":"Crossref","is-referenced-by-count":1,"title":["Improving Test Conformance of Smart Cards versus EMV-Specification by Using on the Fly Temporal Property Verification"],"prefix":"10.1007","author":[{"given":"Germain","family":"Jolly","sequence":"first","affiliation":[]},{"given":"Sylvain","family":"Vernois","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Lambert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"EMV Integrated Circuit Card Specifications for Payment Systems, version 4.3 EMVco (2011)"},{"key":"17_CR2","unstructured":"M\/Chip 4 Card Application Specifications for Credit and Debit, MasterCard International (2002)"},{"key":"17_CR3","unstructured":"Lancia, J.: Un framework de fuzzing pour cartes a puce: application aux protocoles EMV (2011)"},{"key":"17_CR4","unstructured":"Vernois, S., Alimi, V.: WinSCard Tools: a software for the development and security analysis of transactions with smartcards (2010)"},{"key":"17_CR5","unstructured":"ISO\/IEC 7816, International Organization for Standardization and the International Electrotechnical Commission"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Philippaerts, P., Mhlberg, J.T., Penninckx, W., Smans, J., Jacobs, B., Piessens, F.: Software Verification with Verifast: industrial Case Studies (2013)","DOI":"10.1016\/j.scico.2013.01.006"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Distefano, D., Parkinson, M.J.: Jstar: Towards Practical Verification for Java (2009)","DOI":"10.1145\/1449764.1449782"},{"key":"17_CR8","unstructured":"Foster, H.D., Krolnik, A.C., Lacey, D.J.: Assertion-Based Design (2010)"},{"key":"17_CR9","unstructured":"Source code of WSCT, \n                    \n                      https:\/\/github.com\/wsct"},{"key":"17_CR10","unstructured":"Vibert, B., Alimi, V., Vernois, S.: Analyse de la s\u00e9curit\u00e9 de transactions \u00e0 puce avec le framework WinSCard Tools (2012)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T06:21:33Z","timestamp":1558851693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}