{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T16:56:42Z","timestamp":1770137802120,"version":"3.49.0"},"reference-count":17,"publisher":"Oxford University Press (OUP)","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Logic Computation"],"DOI":"10.1093\/logcom\/exw019","type":"journal-article","created":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T07:06:18Z","timestamp":1467183978000},"page":"exw019","source":"Crossref","is-referenced-by-count":6,"title":["Modal independence logic:"],"prefix":"10.1093","author":[{"given":"Juha","family":"Kontinen","sequence":"first","affiliation":[]},{"given":"Julian-Steffen","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"given":"Henning","family":"Schnoor","sequence":"additional","affiliation":[]},{"given":"Heribert","family":"Vollmer","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2016,6,28]]},"reference":[{"key":"2016062900035497000_exw019v1.1","doi-asserted-by":"crossref","unstructured":"Al-Bataineh O.I. and van der Meyden R. .Abstraction for epistemic model checking of dining cryptographers-based protocols.In Theoretical Aspects of Rationality and Knowledge (TARK),K.R. Apt, ed., pp.247\u2013256.ACM Press,2011.","DOI":"10.1145\/2000378.2000408"},{"key":"2016062900035497000_exw019v1.2","unstructured":"Benthem J.V. .Modal Logic and Classical Logic.Bibliopolis,1985."},{"key":"2016062900035497000_exw019v1.3","unstructured":"B\u00f6rger E. , Gr\u00e4del E. and Gurevich Y. .The Classical Decision Problem.Springer,2001."},{"key":"2016062900035497000_exw019v1.4","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"2016062900035497000_exw019v1.5","doi-asserted-by":"crossref","unstructured":"Ebbing J. , Hella L. , Meier A. , M\u00fcller J.-S. , Virtema J. and Vollmer H. .Extended modal dependence logic.In Workshop on Logic, Language, Information, and Computation (WoLLIC),number 8071 in Lecture Notes in Computer Science, pp.126\u2013137,2013.","DOI":"10.1007\/978-3-642-39992-3_13"},{"key":"2016062900035497000_exw019v1.6","doi-asserted-by":"crossref","unstructured":"Ebbing J. and Lohmann P. . Complexity of model checking for modal dependence logic.In Theory and Practice of Computer Science (SOFSEM), number 7147 in Lecture Notes in Computer Science, pp.226\u2013237,2012.","DOI":"10.1007\/978-3-642-27660-6_19"},{"key":"2016062900035497000_exw019v1.7","doi-asserted-by":"publisher","DOI":"10.1016\/j.apal.2011.08.005"},{"key":"2016062900035497000_exw019v1.8","doi-asserted-by":"publisher","DOI":"10.1007\/s11225-013-9479-2"},{"key":"2016062900035497000_exw019v1.9","doi-asserted-by":"crossref","unstructured":"M.Hannula, J.Kontinen,J.Virtema and H.Vollmer.Complexity of propositional independence and inclusion logic.In Mathematical Foundations of Computer Science 2015 - 40th InternationalSymposium, MFCS 2015, Milan, Italy, August 24-28, 2015, Proceedings, Part I,G.F. Italiano, G.Pighizzini, and D.Sannella, eds, Vol. 9234 of Lecture Notes in Computer Science, pp.269\u2013280, 2015.","DOI":"10.1007\/978-3-662-48057-1_21"},{"key":"2016062900035497000_exw019v1.10","unstructured":"L.Hella, K.Luosto, K.Sano and J.Virtema. The expressive power of modal dependence logic. In Advances in Modal Logic 10, Invited and Contributed Papers from the Tenth Conference on \u2018Advances in Modal Logic,\u2019 held in Groningen, The Netherlands, August 5\u20138, 2014, R.Gor\u00e9, B.P. Kooi,and A.Kurucz, eds, pp.294\u2013312, 2014. Available at http:\/\/www.aiml.net\/volumes\/volume10\/Hella-Luosto-Sano-Virtema.pdf."},{"key":"2016062900035497000_exw019v1.11","unstructured":"Kontinen J. , M\u00fcller J.-S. , Schnoor H. and Vollmer H. .A Van Benthem Theorem for Modal Team Semantics. In 24th EACSL Annual Conference on Computer Science Logic (CSL 2015), Vol.41 of Leibniz International Proceedings in Informatics (LIPIcs), Kreutzer, S. ed., pp.277\u2013291,2015. Available at http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2015\/5420."},{"key":"2016062900035497000_exw019v1.12","doi-asserted-by":"publisher","DOI":"10.1215\/00294527-2010-036"},{"key":"2016062900035497000_exw019v1.13","doi-asserted-by":"publisher","DOI":"10.1007\/s10849-015-9217-4"},{"key":"2016062900035497000_exw019v1.14","doi-asserted-by":"crossref","unstructured":"Schnoor H. .Deciding epistemic and strategic properties of cryptographic protocols. InEuropean Symposium on Research in Computer Security (ESORICS), Vol.7459 of Lecture Notes in Computer Science, pp.91\u2013108,2012.","DOI":"10.1007\/978-3-642-33167-1_6"},{"key":"2016062900035497000_exw019v1.15","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exn102"},{"key":"2016062900035497000_exw019v1.16","doi-asserted-by":"crossref","unstructured":", V\u00e4\u00e4n\u00e4nen J. .Dependence Logic.Cambridge University Press,2007.","DOI":"10.1017\/CBO9780511611193"},{"key":"2016062900035497000_exw019v1.17","first-page":"237","article-title":"Modal dependence logic","volume":"5","author":"V\u00e4\u00e4n\u00e4nen","year":"2009","journal-title":"New Perspectives on Games and Interaction"}],"container-title":["Journal of Logic and Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/logcom\/article-pdf\/27\/5\/1333\/18491891\/exw019.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T10:04:47Z","timestamp":1568109887000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/logcom\/article-lookup\/doi\/10.1093\/logcom\/exw019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,28]]},"references-count":17,"alternative-id":["10.1093\/logcom\/exw019"],"URL":"https:\/\/doi.org\/10.1093\/logcom\/exw019","relation":{},"ISSN":["0955-792X","1465-363X"],"issn-type":[{"value":"0955-792X","type":"print"},{"value":"1465-363X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,28]]}}}