{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:49:14Z","timestamp":1729676954959,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194888","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"238-249","source":"Crossref","is-referenced-by-count":3,"title":["MuCAPSL"],"prefix":"10.1109","author":[{"given":"J.","family":"Millen","sequence":"first","affiliation":[]},{"given":"G.","family":"Denker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2001.941406"},{"key":"ref11","article-title":"Group Secure Association Key Management Protocol","author":"harney","year":"2001","journal-title":"Internet Draft IETF"},{"key":"ref12","first-page":"235","article-title":"Simple and fault-tolerant key agreement for dynamic collaborative groups","author":"kim","year":"2000","journal-title":"Proc 7th ACM Conference on Computer and Communications Security"},{"year":"2000","key":"ref13","article-title":"Maude Web Site"},{"key":"ref14","article-title":"Experiences in the formal analysis of the GDOI protocol","author":"meadows","year":"0","journal-title":"Slides Dagstuhl Seminar &#x201C;Specification and Analysis of Secure Cryptographic Protocols 2001"},{"key":"ref15","article-title":"A CAPSL connector to Athena","author":"millen","year":"2000","journal-title":"Workshop on Formal Methods and Security"},{"key":"ref16","article-title":"CAPSL and MuCAPSL","author":"millen","year":"2002","journal-title":"To appear in Special Issue of Journal of Telecommunications and Information Technology (JTIT)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502007"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1145\/263105.263179","article-title":"Iolus: A framework for scalable secure multicasting","author":"mittra","year":"1997","journal-title":"Proceedings of ACM SIGCOMM '97"},{"key":"ref19","first-page":"748","article-title":"PVS: A prototype verification system","author":"owre","year":"1992","journal-title":"11th International Conference on Automated Deduction (CADE) volume 607 of Lecture Notes in Artificial Intelligence"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"ref3","article-title":"The Group Domain of Interpretation","author":"baugher","year":"2001","journal-title":"Internet Draft IETF"},{"key":"ref6","article-title":"Design of a CIL Connector to Maude","author":"denker","year":"2000","journal-title":"2000 Workshop on Formal Methods and Computer Security (FMCS'00) July 20 2000"},{"key":"ref5","first-page":"125","article-title":"Reflection and Strategies in Rewriting Logic","volume":"4","author":"clavel","year":"1996","journal-title":"Proc First Int'l Workshop Rewriting Logic and Its Applications"},{"article-title":"Design and Implementation of Multicast CAPSL and Its Intermediate Language","year":"2002","author":"denker","key":"ref8"},{"key":"ref7","first-page":"207","article-title":"CAPSL integrated protocol environment","author":"denker","year":"2000","journal-title":"Proc 2001 DARPA Information Survivability Conference (DISCEX)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/49.839937"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSC.2001.918970"},{"key":"ref9","article-title":"Modeling group communication protocols using multiset term rewriting","author":"denker","year":"2002","journal-title":"4th International Workshop on Rewriting Logic and its Applications (WRLA'02)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930137"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/71.877936"},{"key":"ref21","article-title":"Diffie-Hellman Key Distribution Extended to Groups","author":"steiner","year":"1996","journal-title":"ACM Conference on Computer and Communications Security"},{"key":"ref23","article-title":"Secure group communications using key graphs","volume":"8","author":"wong","year":"2000","journal-title":"IEEE\/ACM Transactions on Networking"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","acronym":"DISCEX-03","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26875\/01194888.pdf?arnumber=1194888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:04:38Z","timestamp":1497585878000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194888\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194888","relation":{},"subject":[]}}