{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:34:49Z","timestamp":1730252089156,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/icnsc.2008.4525186","type":"proceedings-article","created":{"date-parts":[[2008,5,20]],"date-time":"2008-05-20T20:11:19Z","timestamp":1211314279000},"page":"73-77","source":"Crossref","is-referenced-by-count":3,"title":["A Reduction method for Verification of Security Protocol through CPN"],"prefix":"10.1109","author":[{"given":"Yanlan","family":"Ding","sequence":"first","affiliation":[]},{"given":"Guiping","family":"Su","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"201","article-title":"modeling and verification of cryptographic protocols using coloured petri nets and design\/cpn","volume":"12","author":"al-azzoni","year":"2005","journal-title":"Nordic Journal of Computing"},{"journal-title":"CPN Group","year":"0","key":"18"},{"article-title":"efficient analysis of cryptographic protocols in wireless communication systems","year":"1997","author":"zhao","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44988-4_17"},{"year":"0","key":"13"},{"key":"14","first-page":"121","article-title":"coloured petri nets and state space generation with the symmetry method","author":"elgaard","year":"2002","journal-title":"Proc of the Fourth International Workshop on Practical Use of Coloured Petri Nets and the CPN Tools"},{"key":"11","first-page":"253","article-title":"an on-the-fly model-checker for security protocol analysis","author":"basin","year":"2003","journal-title":"8th European Symposium on Research in Computer Security (ESORICS"},{"key":"12","article-title":"a reduction for automated verification of authentication protocols","author":"scott","year":"1999","journal-title":"LICS'99 Workshop on Formal Methods and Security Protocols"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.102"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"year":"0","key":"1"},{"article-title":"extending formal security protocol specification languages for use with new verification techniques, transactions information science and applications","year":"2005","author":"tian","key":"10"},{"article-title":"automated security analysis of cryptographic protocols using coloured petri nets","year":"1996","author":"doyle","key":"7"},{"key":"6","first-page":"275","article-title":"modeling and analyzing cryptographic protocols using petri nets","volume":"718","author":"nieh","year":"1993","journal-title":"LNCS"},{"article-title":"an integrated approach to protocol design","year":"1990","author":"behki","key":"5"},{"key":"4","article-title":"unknown key-share attacks on the station-to-station (sts) protocol","author":"blake-wilson","year":"1998","journal-title":"Technical report CORR"},{"journal-title":"Coloured Petri Nets Basic Concepts Analysis Methods and Pratical Use volume 2 Analysis Methods","year":"1996","author":"jensen","key":"9"},{"key":"8","first-page":"334","article-title":"new approach to cryptogrrphic protocol analysis using coloured petri nets","volume":"97","author":"basyouni","year":"1997","journal-title":"Proc of the Canadian Conferencb on Electrical and Computer Engineering (CCECE"}],"event":{"name":"2008 IEEE International Conference on Networking, Sensing and Control (ICNSC)","start":{"date-parts":[[2008,4,6]]},"location":"Sanya, China","end":{"date-parts":[[2008,4,8]]}},"container-title":["2008 IEEE International Conference on Networking, Sensing and Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4489617\/4525150\/04525186.pdf?arnumber=4525186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T21:11:50Z","timestamp":1489698710000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4525186\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icnsc.2008.4525186","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}