{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:28:33Z","timestamp":1761596913058},"reference-count":7,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2004,4,1]],"date-time":"2004-04-01T00:00:00Z","timestamp":1080777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":3406,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2004,4]]},"DOI":"10.1016\/s1571-0661(05)82537-x","type":"journal-article","created":{"date-parts":[[2005,5,19]],"date-time":"2005-05-19T13:46:30Z","timestamp":1116510390000},"page":"223-239","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["A Secret-Sharing Protocol Modelled in Maude"],"prefix":"10.1016","volume":"71","author":[{"given":"Dilia E.","family":"Rodr\u00edguez","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(05)82537-X_BIB1","series-title":"Maude: Specification and programming in rewriting logic","author":"Clavel","year":"1999"},{"key":"10.1016\/S1571-0661(05)82537-X_BIB2","doi-asserted-by":"crossref","DOI":"10.1016\/S1571-0661(05)80132-X","article-title":"Rewriting semantics of meta-objects and composable distributed services","volume":"36","author":"Denker","year":"2000","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"10.1016\/S1571-0661(05)82537-X_BIB3","doi-asserted-by":"crossref","DOI":"10.1016\/S1571-0661(05)80139-2","article-title":"Simple network protocol simulation within Maude","volume":"36","author":"Mason","year":"2000","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"10.1016\/S1571-0661(05)82537-X_BIB4","series-title":"\u201cResearch Directions in Concurrent Object-Oriented Programming,\u201d","first-page":"314","article-title":"\u201cA logical theory of concurrent objects and its realization in Maude.\u201d","author":"Meseguer","year":"1993"},{"key":"10.1016\/S1571-0661(05)82537-X_BIB5","article-title":"Real-Time Maude: A tool for simulating and analyzing real-time and hybrid systems","volume":"36","author":"\u00d6lveczky","year":"2000","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"10.1016\/S1571-0661(05)82537-X_BIB6","series-title":"\u201cTowards fault-tolerant and secure on-line services,\u201d Ph.D. thesis","author":"Zhou","year":"2001"},{"key":"10.1016\/S1571-0661(05)82537-X_BIB7","unstructured":"L. Zhou, F. B. Schneider, and R. van Renesse. COCA: A secure distributed on-line certification authority, ACM Transactions on Computer Systems. To appear. Available at http:\/\/www.cs.cornell.edu\/Info\/People\/ldzhou\/coca.htm."}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S157106610582537X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S157106610582537X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T07:31:22Z","timestamp":1683099082000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S157106610582537X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,4]]},"references-count":7,"alternative-id":["S157106610582537X"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(05)82537-x","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2004,4]]}}}