{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:08:36Z","timestamp":1760202516517},"reference-count":14,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2004,4,1]],"date-time":"2004-04-01T00:00:00Z","timestamp":1080777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":3406,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2004,4]]},"DOI":"10.1016\/s1571-0661(05)82527-7","type":"journal-article","created":{"date-parts":[[2005,5,19]],"date-time":"2005-05-19T09:46:30Z","timestamp":1116495990000},"page":"20-39","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["Modeling Group Communication Protocols Using Multiset Term Rewriting"],"prefix":"10.1016","volume":"71","author":[{"given":"Grit","family":"Denker","sequence":"first","affiliation":[]},{"given":"Jon","family":"Millen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(05)82527-7_BIB1","doi-asserted-by":"crossref","DOI":"10.1109\/49.839937","article-title":"New multi-party authentication services and key agreement protocols","author":"Ateniese","year":"2000","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"10.1016\/S1571-0661(05)82527-7_BIB2","article-title":"The Group Domain of Interpretation","author":"Baugher","year":"2001","journal-title":"Internet Draft, IETF"},{"key":"10.1016\/S1571-0661(05)82527-7_BIB3","series-title":"12th IEEE Computer Security Foundations Workshop","first-page":"55","article-title":"A metanotation for protocol analysis","author":"Cervesato","year":"1999"},{"key":"10.1016\/S1571-0661(05)82527-7_BIB4","unstructured":"G. Denker, J. Millen. CAPSL Intermediate Language. N. Heintze and E. Clarke, editors, Workshop on Formal Methods and Security Protocols (FMSP\u203299), July 5, 1999, Trento, Italy (part of FLOC\u203299), 1999. http:\/\/cm.bell-labs.com\/cm\/cs\/who\/nch\/fmsp99\/."},{"key":"10.1016\/S1571-0661(05)82527-7_BIB5","series-title":"Proc. DARPA Information Survivability Conference and Exposition, DISCEX2000, January 25-27","first-page":"207","article-title":"CAPSL Integrated Protocol Environment","author":"Denker","year":"2000"},{"key":"10.1016\/S1571-0661(05)82527-7_BIB6","series-title":"CSL Report SRI-CSL-2000-02, Computer Science Laboratory","article-title":"The CAPSL Integrated Protocol Environment","author":"Denker","year":"2000"},{"key":"10.1016\/S1571-0661(05)82527-7_BIB7","series-title":"CSL Report, Computer Science Laboratory","article-title":"Design and Implementation of Multicast CAPSL and Its Intermediate Language","author":"Denker","year":"2002"},{"key":"10.1016\/S1571-0661(05)82527-7_BIB8","series-title":"Formal Methods and Security Protocols","article-title":"Protocol specification and analysis in Maude","author":"Denker","year":"1998"},{"key":"10.1016\/S1571-0661(05)82527-7_BIB9","article-title":"Group Secure Association Key Management Protocol","author":"Harney","year":"2001","journal-title":"Internet Draft, IETF"},{"key":"10.1016\/S1571-0661(05)82527-7_BIB10","article-title":"CAPSL and MuCAPSL","author":"Millen","year":"2000","journal-title":"To appear in Special Issue of Journal of Telecommunications and Information Technology (JTIT)"},{"key":"10.1016\/S1571-0661(05)82527-7_BIB11","article-title":"Experiences in the formal analysis of the GDOI protocol","author":"Meadows","year":"2001","journal-title":"Slides, Dagstuhl Seminar \u201cSpecification and Analysis of Secure Cryptographic Protocols"},{"key":"10.1016\/S1571-0661(05)82527-7_BIB12","series-title":"14th IEEE Computer Security Foundations Workshop","first-page":"73","article-title":"A security analysis of the cliques protocol suites","author":"Pereira","year":"2001"},{"key":"10.1016\/S1571-0661(05)82527-7_BIB13","article-title":"Diffie-Hellman Key Distribution Extended to Groups. ACM Conference on Computer and Communications Security","author":"Steiner","year":"1996","journal-title":"ACM"},{"key":"10.1016\/S1571-0661(05)82527-7_BIB14","doi-asserted-by":"crossref","unstructured":"M. Steiner, G. Tsudik, M. Waidner. CLIQUES: A New Approach to Group Key Agreement. IEEE International Conference on Distributed Computing Systems (ICDCS\u203298), 1998.","DOI":"10.1109\/ICDCS.1998.679745"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066105825277?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066105825277?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T22:12:12Z","timestamp":1550700732000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066105825277"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,4]]},"references-count":14,"alternative-id":["S1571066105825277"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(05)82527-7","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2004,4]]}}}