{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:29:41Z","timestamp":1750746581832,"version":"3.37.3"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/501100001665","name":"ANR","doi-asserted-by":"publisher","award":["ANR-17-CE39-0004-03"],"award-info":[{"award-number":["ANR-17-CE39-0004-03"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1109\/csf54842.2022.9919644","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:29:20Z","timestamp":1667525360000},"page":"319-334","source":"Crossref","is-referenced-by-count":1,"title":["Symbolic protocol verification with dice: process equivalences in the presence of probabilities"],"prefix":"10.1109","author":[{"given":"Vincent","family":"Cheval","sequence":"first","affiliation":[{"name":"Inria Paris,Paris,France"}]},{"given":"Rapha\u00eblle","family":"Crubill\u00e9","sequence":"additional","affiliation":[{"name":"Aix Marseille Univ, Universit&#x00E9; de Toulon, CNRS, LIS,Marseille,France"}]},{"given":"Steve","family":"Kremer","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; de Lorraine, Inria Nancy Grand-Est &#x0026; LORIA,Villers-l&#x00E8;s-Nancy,France"}]}],"member":"263","reference":[{"key":"ref13","first-page":"250","article-title":"Probabilistic simulations for probabilistic processes","volume":"2","author":"segala","year":"1995","journal-title":"Nordic Journal of Computing"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76637-7_12"},{"key":"ref34","first-page":"118","article-title":"A practical voter-verifiable election scheme","volume":"3679","author":"chaum","year":"2005","journal-title":"10th European Symposium on Research in Computer Security (ESORICS'05)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.276.4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71389-0_21"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-10003-2_79"},{"journal-title":"Axiomatisations and types for probabilistic and mobile processes","year":"2005","author":"deng","key":"ref30"},{"key":"ref11","article-title":"The applied pi calculus: Mobile values, new names, and secure communication","author":"abadi","year":"2017","journal-title":"Journal of the ACM (JACM)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0039617"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"journal-title":"Operational methods in semantics","year":"2016","author":"amadio","key":"ref32"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.26"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04081-8_19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2019.8785673"},{"journal-title":"Principles of markov automata","year":"2017","author":"eisentraut","key":"ref19"},{"journal-title":"Alea Jacta Est Verification of Probabilistic Real-time and Parametric Systems","year":"2002","author":"stoelinga","key":"ref18"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455786"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2013.04.016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96142-2_10"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2017.8005126"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2009.06.006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00033"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15240-5_5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1561\/3300000004"},{"key":"ref27","article-title":"Symbolic protocol verification with dice: process equivalences in the presence of probabilities (extended version)","author":"cheval","year":"2022","journal-title":"working paper or preprint"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(92)90008-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s10817-010-9187-9","article-title":"A survey of symbolic methods in computational analysis of cryptographic systems","volume":"46","author":"cortier","year":"2010","journal-title":"Journal of Automated Reasoning"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09360-1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134063"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00037"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243846"}],"event":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","start":{"date-parts":[[2022,8,7]]},"location":"Haifa, Israel","end":{"date-parts":[[2022,8,10]]}},"container-title":["2022 IEEE 35th Computer Security Foundations Symposium (CSF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9919409\/9919636\/09919644.pdf?arnumber=9919644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:20:12Z","timestamp":1699485612000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9919644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/csf54842.2022.9919644","relation":{},"subject":[],"published":{"date-parts":[[2022,8]]}}}