{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:10:26Z","timestamp":1729671026204,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/hpcs.2010.5547120","type":"proceedings-article","created":{"date-parts":[[2010,8,18]],"date-time":"2010-08-18T18:21:20Z","timestamp":1282155680000},"page":"274-282","source":"Crossref","is-referenced-by-count":1,"title":["Timed protocols insecurity problem is NP-complete"],"prefix":"10.1109","author":[{"given":"Massimo","family":"Benerecetti","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Cuomo","sequence":"additional","affiliation":[]},{"given":"Adriano","family":"Peron","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"ref11","article-title":"The TESLA broadcast authentication protocol","volume":"6","author":"perrig","year":"2002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0041-y"},{"key":"ref13","first-page":"277","article-title":"The CL-atse protocol analyser","volume":"4098","author":"turuani","year":"2006","journal-title":"Term Rewriting and Applications 17th International Conference RTA 2006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0055-7"},{"key":"ref15","first-page":"315","article-title":"On the security of multi-party ping-pong protocols","author":"even","year":"1982","journal-title":"Crypto"},{"key":"ref16","article-title":"Undecidability of bounded security protocols","author":"durgin","year":"1999","journal-title":"Proc Workshop on Formal Methods and Security Protocols (FMSP'99)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref18","article-title":"Verification of timed automata via satisfiability checking","volume":"19","author":"niebert","year":"2002"},{"article-title":"Introduction to Algorithms","year":"1990","author":"cormen","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/74850.74852"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806125"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.4.5.366-377"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/3-540-36575-3_9","article-title":"A simple language for real-time cryptographic protocol analysis","volume":"2618","author":"gorrieri","year":"2003","journal-title":"Programming Languages and Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(94)90010-8"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1080\/1206212X.2009.11441940","article-title":"An environment for the specification and verification of time dependent security protocols","volume":"31","author":"benerecetti","year":"2009","journal-title":"International Journal of Computers and Applications"},{"key":"ref2","first-page":"1","article-title":"The AVISPA tool for the automated validation of internet security protocols and applications","author":"armando","year":"2005","journal-title":"Computer-Aided Verification"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(02)00490-5"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-27755-2_3","article-title":"Timed automata: Semantics, algorithms and tools","author":"bengtsson","year":"2004"}],"event":{"name":"Simulation (HPCS)","start":{"date-parts":[[2010,6,28]]},"location":"Caen, France","end":{"date-parts":[[2010,7,2]]}},"container-title":["2010 International Conference on High Performance Computing &amp; Simulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5538704\/5547051\/05547120.pdf?arnumber=5547120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T02:46:06Z","timestamp":1559443566000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5547120\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/hpcs.2010.5547120","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}