{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:28:36Z","timestamp":1760171316444,"version":"3.44.0"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10270-024-01201-0","type":"journal-article","created":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T06:02:21Z","timestamp":1723788141000},"page":"1267-1292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Evaluating formal model verification tools in an industrial context: the case of a smart device life cycle management system"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6234-5851","authenticated-orcid":false,"given":"Maxime","family":"M\u00e9r\u00e9","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Jouault","sequence":"additional","affiliation":[]},{"given":"Lo\u00efc","family":"Pallardy","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Perdriau","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,16]]},"reference":[{"issue":"8","key":"1201_CR1","doi-asserted-by":"publisher","first-page":"02264","DOI":"10.1016\/j.heliyon.2019.e02264","volume":"5","author":"M Dachyar","year":"2019","unstructured":"Dachyar, M., Zagloel, T.Y.M., Saragih, L.R.: Knowledge growth and development: internet of things (IoT) research, 2006\u20132018. Heliyon 5(8), 02264 (2019). https:\/\/doi.org\/10.1016\/j.heliyon.2019.e02264","journal-title":"Heliyon"},{"issue":"3","key":"1201_CR2","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0959-6526(01)00039-7","volume":"10","author":"OK Mont","year":"2002","unstructured":"Mont, O.K.: Clarifying the concept of product-service system. J. Clean. Prod. 10(3), 237\u2013245 (2002). https:\/\/doi.org\/10.1016\/S0959-6526(01)00039-7","journal-title":"J. Clean. Prod."},{"key":"1201_CR3","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.procir.2017.03.024","volume":"64","author":"K Exner","year":"2017","unstructured":"Exner, K., Schn\u00fcrmacher, C., Adolphy, S., Stark, R.: Proactive maintenance as success factor for use-oriented product-service systems. Procedia CIRP 64, 330\u2013335 (2017). https:\/\/doi.org\/10.1016\/j.procir.2017.03.024","journal-title":"Procedia CIRP"},{"key":"1201_CR4","doi-asserted-by":"publisher","unstructured":"M\u00e9r\u00e9, M., Jouault, F., Pallardy, L., Perdriau, R.: Feedback on the formal verification of UML models in an industrial context. In: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems. MODELS \u201922, pp. 121\u2013131. ACM, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3550355.3552454","DOI":"10.1145\/3550355.3552454"},{"key":"1201_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/TCE.2021.3139584","volume":"68","author":"MN Islam","year":"2021","unstructured":"Islam, M.N., Kundu, S.: Remote device management via smart contracts. IEEE Trans. Consum. Electron. 68, 38\u201346 (2021). https:\/\/doi.org\/10.1109\/TCE.2021.3139584","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"8","key":"1201_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MC.2016.243","volume":"49","author":"JP Skudlarek","year":"2016","unstructured":"Skudlarek, J.P., Katsioulas, T., Chen, M.: A platform solution for secure supply-chain and chip life-cycle management. Computer 49(8), 28\u201334 (2016). https:\/\/doi.org\/10.1109\/MC.2016.243","journal-title":"Computer"},{"key":"1201_CR7","doi-asserted-by":"publisher","unstructured":"M\u00e9r\u00e9, M., Jouault, F., Pallardy, L., Perdriau, R.: Trustworthy SoC reconfiguration aimed at product-service systems: a literature review. In: COINS Conference, pp. 1\u20136. IEEE Computer Society, Barcelona, Spain (2022). https:\/\/doi.org\/10.1109\/COINS54846.2022.9854965","DOI":"10.1109\/COINS54846.2022.9854965"},{"key":"1201_CR8","doi-asserted-by":"publisher","unstructured":"Robson, N., Safran, J., Kothandaraman, C., Cestero, A., Chen, X., Rajeevakumar, R., Leslie, A., Moy, D., Kirihata, T., Iyer, S.: Electrically programmable fuse (eFUSE): from memory redundancy to autonomic chips. In: 2007 IEEE Custom Integrated Circuits Conference, pp. 799\u2013804 (2007). https:\/\/doi.org\/10.1109\/CICC.2007.4405850 . ISSN: 2152-3630","DOI":"10.1109\/CICC.2007.4405850"},{"key":"1201_CR9","unstructured":"Tanaka, K., Nakamura, S.: Storage system and data protection method therefor. Google Patents (2009)"},{"key":"1201_CR10","doi-asserted-by":"publisher","unstructured":"Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R.P., Markantonakis, K., Akram, R.N., Sauveron, D., Conchon, E.: Secure and trusted execution: past, present, and future - a critical review in the context of the internet of things and cyber-physical systems. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp. 168\u2013177 (2016). https:\/\/doi.org\/10.1109\/TrustCom.2016.0060. ISSN: 2324-9013","DOI":"10.1109\/TrustCom.2016.0060"},{"key":"1201_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68511-3","volume-title":"The Hardware Trojan War","author":"S Bhunia","year":"2018","unstructured":"Bhunia, S., Tehranipoor, M.: The Hardware Trojan War. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-68511-3"},{"issue":"3","key":"1201_CR12","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/LES.2019.2953485","volume":"12","author":"MI Mera Collantes","year":"2020","unstructured":"Mera Collantes, M.I., Garg, S.: Do not trust, verify: a verifiable hardware accelerator for matrix multiplication. IEEE Embed. Syst. Lett. 12(3), 70\u201373 (2020). https:\/\/doi.org\/10.1109\/LES.2019.2953485","journal-title":"IEEE Embed. Syst. Lett."},{"key":"1201_CR13","unstructured":"SGS Soci\u00e9t\u00e9 G\u00e9n\u00e9rale de Surveillance: SGS Brightsight (2023). https:\/\/www.brightsight.com\/system-on-chip Accessed 2023-06-12"},{"issue":"1\u20133","key":"1201_CR14","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1504\/IJAHUC.2021.119089","volume":"38","author":"S Hakak","year":"2021","unstructured":"Hakak, S., Khan, W.Z., Gilkar, G.A., Assiri, B., Alazab, M., Bhattacharya, S., Reddy, G.T.: Recent advances in blockchain technology: a survey on applications and challenges. Int. J. Ad Hoc Ubiquitous Comput. 38(1\u20133), 82\u2013100 (2021)","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"key":"1201_CR15","doi-asserted-by":"publisher","unstructured":"Mohanta, B.K., Panda, S.S., Jena, D.: An overview of smart contract and use cases in blockchain technology. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1\u20134. IEEE, Bengaluru, India (2018). https:\/\/doi.org\/10.1109\/ICCCNT.2018.8494045","DOI":"10.1109\/ICCCNT.2018.8494045"},{"key":"1201_CR16","doi-asserted-by":"publisher","unstructured":"M\u00e9r\u00e9, M., Jouault, F., Pallardy, L., Perdriau, R.: Modeling trust relationships in blockchain applications: the case of reconfigurable systems-on-chip. In: 2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C), pp. 1\u20138 (2022). https:\/\/doi.org\/10.1109\/QRS-C57518.2022.00020 . ISSN: 2693-9371","DOI":"10.1109\/QRS-C57518.2022.00020"},{"key":"1201_CR17","unstructured":"OMG: Unified Modeling Language (2017). https:\/\/www.omg.org\/spec\/UML\/2.5.1\/PDF"},{"key":"1201_CR18","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/3-540-65306-6_21","volume-title":"Lectures on Petri Nets I: Basic Models: Advances In Petri Nets","author":"A Valmari","year":"1998","unstructured":"Valmari, A.: The state explosion problem. In: Reisig, W., Rozenberg, G. (eds.) Lectures on Petri Nets I: Basic Models: Advances In Petri Nets, pp. 429\u2013528. Springer, Berlin (1998). https:\/\/doi.org\/10.1007\/3-540-65306-6_21"},{"key":"1201_CR19","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-319-10082-1_3","volume-title":"Foundations of Security Analysis and Design VII: FOSAD 2012\/2013 Tutorial Lectures","author":"B Blanchet","year":"2014","unstructured":"Blanchet, B.: Automatic verification of security protocols in the symbolic model: the verifier ProVerif. In: Aldini, A., Lopez, J., Martinelli, F. (eds.) Foundations of Security Analysis and Design VII: FOSAD 2012\/2013 Tutorial Lectures, pp. 54\u201387. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10082-1_3"},{"key":"1201_CR20","doi-asserted-by":"publisher","unstructured":"Cervesato, I., Durgin, N.A., Lincoln, P.D., Mitchell, J.C., Scedrov, A.: A meta-notation for protocol analysis. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, pp. 55\u201369. IEEE, Mordano, Italy (1999).https:\/\/doi.org\/10.1109\/CSFW.1999.779762 . ISSN: 1063-6900","DOI":"10.1109\/CSFW.1999.779762"},{"key":"1201_CR21","unstructured":"Kobeissi, N., Nicolas, G., Tiwari, M.: Verifpal: cryptographic protocol analysis for the real world. Published: Cryptology ePrint Archive, Report 2019\/971 (2019). https:\/\/ia.cr\/2019\/971"},{"key":"1201_CR22","doi-asserted-by":"publisher","unstructured":"Jouault, F., Besnard, V., Calvar, T.L., Teodorov, C., Brun, M., Delatour, J.: Designing, animating, and verifying partial UML models. In: Proceedings of the 23rd ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems. MODELS \u201920, pp. 211\u2013217. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3365438.3410967","DOI":"10.1145\/3365438.3410967"},{"key":"1201_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2023.103050","volume":"232","author":"F Jouault","year":"2024","unstructured":"Jouault, F., Besnard, V., Brun, M., Le Calvar, T., Chhel, F., Clavreul, M., Delatour, J., M\u00e9r\u00e9, M., Pasquier, M., Teodorov, C.: Animuml: a practical tool for partial model animation and analysis. Sci. Comput. Program. 232, 103050 (2024). https:\/\/doi.org\/10.1016\/j.scico.2023.103050","journal-title":"Sci. Comput. Program."},{"key":"1201_CR24","doi-asserted-by":"publisher","unstructured":"Knapp, A.: In: Haxthausen, A.E., Huang, W.-l., Roggenbach, M. (eds.) An Intermediate Language-Based Approach to Implementing and Verifying Communicating UML State Machines, pp. 289\u2013307. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-40132-9_18","DOI":"10.1007\/978-3-031-40132-9_18"},{"issue":"13s","key":"1201_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3579821","volume":"55","author":"E Andr\u00e9","year":"2023","unstructured":"Andr\u00e9, E., Liu, S., Liu, Y., Choppy, C., Sun, J., Dong, J.S.: Formalizing UML state machines for automated verification-a survey. ACM Comput. Surv. 55(13s), 1\u201347 (2023). https:\/\/doi.org\/10.1145\/3579821","journal-title":"ACM Comput. Surv."},{"key":"1201_CR26","doi-asserted-by":"publisher","unstructured":"Besnard, V., Brun, M., Jouault, F., Teodorov, C., Dhaussy, P.: Unified LTL verification and embedded execution of UML models. In: Proceedings of the 21th ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems. MODELS \u201918, pp. 112\u2013122. Association for Computing Machinery, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3239372.3239395","DOI":"10.1145\/3239372.3239395"},{"key":"1201_CR27","unstructured":"Roques, A.: PlantUML: Open-source tool that uses simple textual descriptions to draw UML diagrams (2022). http:\/\/plantuml.com\/ Accessed 2022-04-25"},{"key":"1201_CR28","unstructured":"Holzmann, G.J.: The spin model checker: primer and reference manual 1003 (2004)"},{"key":"1201_CR29","unstructured":"Behrmann, G., David, A., Larsen, K.G., H\u00e5kansson, J., Pettersson, P., Yi, W., Hendriks, M.: Uppaal 4.0 (2006)"},{"key":"1201_CR30","doi-asserted-by":"publisher","unstructured":"Dewoprabowo, R., Arzaki, M., Rusmawati, Y.: Formal verification of divide and conquer key distribution protocol using ProVerif and TLA+. In: 2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS), pp. 451\u2013458 (2018). https:\/\/doi.org\/10.1109\/ICACSIS.2018.8618173. ISSN: 2330-4588","DOI":"10.1109\/ICACSIS.2018.8618173"},{"key":"1201_CR31","doi-asserted-by":"publisher","unstructured":"Latif, S., Rehman, A., Zafar, N.A.: Blockchain and IoT based formal model of smart waste management system using TLA+. In: 2019 International Conference on Frontiers of Information Technology (FIT), pp. 304\u20133045. IEEE, Islamabad, Pakistan (2019). https:\/\/doi.org\/10.1109\/FIT47737.2019.00064. ISSN: 2334-3141","DOI":"10.1109\/FIT47737.2019.00064"},{"key":"1201_CR32","doi-asserted-by":"crossref","unstructured":"Rocha, H., Ducasse, S.: Preliminary steps towards modeling blockchain oriented software. In: 2018 IEEE\/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 52\u201357. IEEE, Gothenburg Sweden (2018)","DOI":"10.1145\/3194113.3194123"},{"key":"1201_CR33","doi-asserted-by":"publisher","unstructured":"Koch, T., Dziwok, S., Holtmann, J., Bodden, E.: Scenario-based specification of security protocols and transformation to security model checkers. In: Proceedings of the 23rd ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems. MODELS \u201920, pp. 343\u2013353. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3365438.3410946","DOI":"10.1145\/3365438.3410946"},{"key":"1201_CR34","doi-asserted-by":"publisher","first-page":"14836","DOI":"10.1109\/ACCESS.2021.3052578","volume":"9","author":"J Zhang","year":"2021","unstructured":"Zhang, J., Yang, L., Gao, X., Tang, G., Zhang, J., Wang, Q.: Formal analysis of QUIC handshake protocol using symbolic model checking. IEEE Access 9, 14836\u201314848 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3052578","journal-title":"IEEE Access"},{"key":"1201_CR35","doi-asserted-by":"publisher","unstructured":"Lauser, T., Zelle, D., Krau\u00df, C.: Security analysis of automotive protocols. In: Computer Science in Cars Symposium. CSCS \u201920, pp. 1\u201312. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3385958.3430482","DOI":"10.1145\/3385958.3430482"},{"key":"1201_CR36","doi-asserted-by":"publisher","unstructured":"Chen, X., Mallet, F., Liu, X.: Formally verifying sequence diagrams for safety critical systems. In: 2020 International Symposium on Theoretical Aspects of Software Engineering (TASE), pp. 217\u2013224. IEEE, Hangzhou, China (2020). https:\/\/doi.org\/10.1109\/TASE49443.2020.00037","DOI":"10.1109\/TASE49443.2020.00037"},{"key":"1201_CR37","doi-asserted-by":"publisher","unstructured":"Csertan, G., Huszerl, G., Majzik, I., Pap, Z., Pataricza, A., Varro, D.: VIATRA - visual automated transformations for formal verification and validation of UML models. In: Proceedings 17th IEEE International Conference on Automated Software Engineering, pp. 267\u2013270. IEEE, Edinburgh, UK (2002). https:\/\/doi.org\/10.1109\/ASE.2002.1115027 . ISSN: 1938-4300","DOI":"10.1109\/ASE.2002.1115027"},{"key":"1201_CR38","doi-asserted-by":"publisher","unstructured":"Cabot, J., Claris\u00f3, R., Riera, D.: UMLtoCSP: a tool for the formal verification of uml\/ocl models using constraint programming. In: Proceedings of the Twenty-Second IEEE\/ACM International Conference on Automated Software Engineering. ASE \u201907, pp. 547\u2013548. Association for Computing Machinery, New York, NY, USA (2007). https:\/\/doi.org\/10.1145\/1321631.1321737","DOI":"10.1145\/1321631.1321737"},{"key":"1201_CR39","unstructured":"Glouche, Y., Genet, T., Heen, O., Courtay, O.: A security protocol animator tool for avispa. In: ARTIST-2 Workshop on Security of Embedded Systems, Pisa (Italy) (2006). http:\/\/people.irisa.fr\/Thomas.Genet\/Publications\/papier_artist.pdf"},{"key":"1201_CR40","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigan\u00f2","year":"2006","unstructured":"Vigan\u00f2, L.: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 155, 61\u201386 (2006). https:\/\/doi.org\/10.1016\/j.entcs.2005.11.052","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"1201_CR41","doi-asserted-by":"publisher","unstructured":"Mossberg, M., Manzano, F., Hennenfent, E., Groce, A., Grieco, G., Feist, J., Brunson, T., Dinaburg, A.: Manticore: a user-friendly symbolic execution framework for binaries and smart contracts. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1186\u20131189 (2019). https:\/\/doi.org\/10.1109\/ASE.2019.00133","DOI":"10.1109\/ASE.2019.00133"},{"key":"1201_CR42","doi-asserted-by":"publisher","unstructured":"Leid, A., Merwe, B., Visser, W.: Testing ethereum smart contracts: a comparison of symbolic analysis and fuzz testing tools. In: Conference of the South African Institute of Computer Scientists and Information Technologists 2020. SAICSIT \u201920, pp. 35\u201343. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3410886.3410907","DOI":"10.1145\/3410886.3410907"},{"key":"1201_CR43","doi-asserted-by":"publisher","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp. 46\u201357. IEEE, Providence, RI, USA (1977). https:\/\/doi.org\/10.1109\/SFCS.1977.32 . ISSN: 0272-5428","DOI":"10.1109\/SFCS.1977.32"},{"key":"1201_CR44","doi-asserted-by":"publisher","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002), pp. 411\u2013420. IEEE, Los Angeles, CA, USA (1999). https:\/\/doi.org\/10.1145\/302405.302672 . ISSN: 0270-5257","DOI":"10.1145\/302405.302672"},{"key":"1201_CR45","unstructured":"Blanchet, B., Smyth, B., Cheval, V., Sylvestre, M.: ProVerif 2.04: automatic cryptographic protocol verifier, user manual and tutorial (2021). https:\/\/bblanche.gitlabpages.inria.fr\/proverif\/manual.pdf"},{"issue":"1","key":"1201_CR46","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jlap.2007.06.002","volume":"75","author":"B Blanchet","year":"2008","unstructured":"Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. J. Logic Algebraic Program. 75(1), 3\u201351 (2008). https:\/\/doi.org\/10.1016\/j.jlap.2007.06.002","journal-title":"J. Logic Algebraic Program."},{"key":"1201_CR47","doi-asserted-by":"publisher","unstructured":"Leon, D., Stalick, A.Q., Jillepalli, A.A., Haney, M.A., Sheldon, F.T.: Blockchain: properties and misconceptions. Asia Pacific Journal of Innovation and Entrepreneurship 11(3), 286\u2013300 (2017). https:\/\/doi.org\/10.1108\/APJIE-12-2017-034. Publisher: Emerald Publishing Limited","DOI":"10.1108\/APJIE-12-2017-034"},{"issue":"4","key":"1201_CR48","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10617-008-9028-9","volume":"12","author":"Y Vanderperren","year":"2008","unstructured":"Vanderperren, Y., Mueller, W., Dehaene, W.: UML for electronic systems design: a comprehensive overview. Des. Autom. Embed. Syst. 12(4), 261\u2013292 (2008). https:\/\/doi.org\/10.1007\/s10617-008-9028-9","journal-title":"Des. Autom. Embed. Syst."},{"key":"1201_CR49","doi-asserted-by":"publisher","unstructured":"Singh, R.G., Lopez, C.T., Marr, S., Boix, E.G., Scholliers, C.: Multiverse Debugging: non-deterministic debugging for non-deterministic programs (Artifact). Dagstuhl Artifacts Series 5(2), 4\u2013143 (2019). https:\/\/doi.org\/10.4230\/DARTS.5.2.4. Place: Dagstuhl, Germany Publisher: Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik","DOI":"10.4230\/DARTS.5.2.4"},{"key":"1201_CR50","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-030-26948-7_20","volume-title":"Advances in Cryptology - CRYPTO 2019","author":"D Boneh","year":"2019","unstructured":"Boneh, D., B\u00fcnz, B., Fisch, B.: Batching techniques for accumulators with applications to IOPs and stateless blockchains. In: Boldyreva, A., Micciancio, D. (eds.) Advances in Cryptology - CRYPTO 2019, pp. 561\u2013586. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26948-7_20"},{"key":"1201_CR51","unstructured":"Becker, G.: Merkle signature schemes, merkle trees and their cryptanalysis"}],"container-title":["Software and Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-024-01201-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10270-024-01201-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-024-01201-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T20:38:38Z","timestamp":1757104718000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10270-024-01201-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,16]]},"references-count":51,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1201"],"URL":"https:\/\/doi.org\/10.1007\/s10270-024-01201-0","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"type":"print","value":"1619-1366"},{"type":"electronic","value":"1619-1374"}],"subject":[],"published":{"date-parts":[[2024,8,16]]},"assertion":[{"value":"4 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}