{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T20:40:01Z","timestamp":1748464801691,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662477083"},{"type":"electronic","value":"9783662477090"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-47709-0_4","type":"book-chapter","created":{"date-parts":[[2015,6,23]],"date-time":"2015-06-23T07:07:37Z","timestamp":1435043257000},"page":"38-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Equation-Based Classical Logic"],"prefix":"10.1007","author":[{"given":"Andreia","family":"Mordido","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Caleiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,24]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Cortier, V.: Deciding knowledge in security protocols under (many more) equational theories. In: Proceeding of the 18th IEEE Computer Security Foundations Workshop (CSFW 2005), pp. 62\u201376. IEEE Computer Society (2005)","DOI":"10.1109\/CSFW.2005.14"},{"issue":"1\u20132","key":"4_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.tcs.2006.08.032","volume":"387","author":"M Abadi","year":"2006","unstructured":"Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoret. Comput. Sci. 387(1\u20132), 2\u201332 (2006)","journal-title":"Theoret. Comput. Sci."},{"key":"4_CR3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139172752","volume-title":"Term Rewriting and All That","author":"F Baader","year":"1998","unstructured":"Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press, Cambridge (1998)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Baudet, M.: Deciding security of protocols against off-line guessing attacks. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, pp. 16\u201325. ACM, New York (2005)","DOI":"10.1145\/1102120.1102125"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-19751-2_3","volume-title":"Formal Aspects of Security and Trust","author":"B Conchinha","year":"2011","unstructured":"Conchinha, B., Basin, D., Caleiro, C.: Efficient decision procedures for message deducibility and static equivalence. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 34\u201349. Springer, Heidelberg (2011)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-642-40203-6_21","volume-title":"Computer Security \u2013 ESORICS 2013","author":"B Conchinha","year":"2013","unstructured":"Conchinha, B., Basin, D., Caleiro, C.: Symbolic probabilistic analysis of off-line guessing. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 363\u2013380. Springer, Heidelberg (2013)"},{"key":"4_CR7","unstructured":"Corin, R., Etalle, S.: A simple procedure for finding guessing attacks (extended abstract) (2004)"},{"issue":"3\u20134","key":"4_CR8","first-page":"225","volume":"46","author":"V Cortier","year":"2010","unstructured":"Cortier, V., Kremer, S., Warinschi, B.: A survey of symbolic methods in computational analysis of cryptographic systems. J. Autom. Reasoning 46(3\u20134), 225\u2013259 (2010)","journal-title":"J. Autom. Reasoning"},{"issue":"1\u20132","key":"4_CR9","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/0890-5401(90)90060-U","volume":"87","author":"R Fagin","year":"1990","unstructured":"Fagin, R., Halpern, J.Y., Megiddo, N.: A logic for reasoning about probabilities. Inf. Comput. 87(1\u20132), 78\u2013128 (1990)","journal-title":"Inf. Comput."},{"key":"4_CR10","unstructured":"Finger, M., Bona, G.D.: Probabilistic satisfiability: Logic-based algorithms and phase transition. In: Walsh, T. (ed.) IJCAI, pp. 528\u2013533. IJCAI\/AAAI (2011)"},{"key":"4_CR11","unstructured":"Mateus, P., Sernadas, A., Sernadas, C.: Exogenous semantics approach to enriching logics. In: Essays on the Foundation of Mathematics and Logic, volume 1 of Advanced Studies in Mathematics and Logic, pp. 165\u2013194. Polimetrica (2005)"},{"issue":"6","key":"4_CR12","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1145\/1217856.1217859","volume":"53","author":"R Nieuwenhuis","year":"2006","unstructured":"Nieuwenhuis, R., Oliveras, A., Tinelli, C.: Solving SAT and SAT modulo theories: from an abstract Davis-Putnam-Logemann-Loveland procedure to DPLL(T). J. ACM 53(6), 937\u2013977 (2006)","journal-title":"J. ACM"},{"issue":"1","key":"4_CR13","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/0004-3702(86)90031-7","volume":"28","author":"NJ Nilsson","year":"1986","unstructured":"Nilsson, N.J.: Probabilistic logic. Artif. Intell. 28(1), 71\u201388 (1986)","journal-title":"Artif. Intell."}],"container-title":["Lecture Notes in Computer Science","Logic, Language, Information, and Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-47709-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T20:21:53Z","timestamp":1748463713000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-47709-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662477083","9783662477090"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-47709-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"24 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}