{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:46:04Z","timestamp":1729619164010,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122838","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T22:01:11Z","timestamp":1326319271000},"page":"308-313","source":"Crossref","is-referenced-by-count":3,"title":["Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Farshad","family":"Amin","sequence":"first","affiliation":[]},{"given":"Amir Hossein","family":"Jahangir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The SPIN Model Checker Primer and Reference Manual","year":"2003","author":"holzmann","key":"19"},{"key":"17","first-page":"342","article-title":"Automatic verification of time sensitive cryptographic protocols","author":"delzanno","year":"2004","journal-title":"10th International Conference TACAS 2004 Held As Part of the Joint European Conferences on Theory and Practice of Software ETAPS 2004"},{"key":"18","first-page":"76","article-title":"Proof theory, transformations, and logic programming for debugging security protocols","volume":"2372","author":"delzanno","year":"2001","journal-title":"LNCS"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/11549970_15"},{"key":"15","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/978-3-540-30080-9_7","article-title":"A tutorial on Uppaal","volume":"3185","author":"behrmann","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"16","first-page":"361","article-title":"Kerberos version IV: Inductive analysis of the secrecy goals","volume":"1485","author":"bella","year":"1998","journal-title":"LNCS"},{"key":"13","article-title":"Analysis of Public-Key Cryptography for Wireless Sensor Networks Security","author":"amin","year":"0","journal-title":"International Conference on Cryptography Coding and Information Security (ICCCIS'08) Austria 2008"},{"journal-title":"Applied Formal Methods in Wireless Sensor Networks","year":"2009","author":"werner","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.1992.276232"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502007"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596779"},{"journal-title":"Security in Distributed Grid and Pervasive Computing","year":"2006","author":"walters","key":"22"},{"key":"23","first-page":"197","article-title":"Tulafale: A security tool for web services","author":"bhargavan","year":"2003","journal-title":"Proc of FM'03"},{"key":"24","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/s100090050010","article-title":"Uppaal in a Nutshell","volume":"1","author":"larsen","year":"1997","journal-title":"International Journal on Software Tools for Technology Transfer"},{"key":"25","first-page":"222","article-title":"Analysing time dependent security properties in CSP using PVS","volume":"1895","author":"evans","year":"2000","journal-title":"LNCS"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0032042"},{"journal-title":"Security in WSN in Enhance AODV Routing","year":"2006","author":"ghazali","key":"27"},{"key":"28","doi-asserted-by":"crossref","first-page":"619","DOI":"10.3233\/JCS-2007-15603","article-title":"Timed analysis of security protocols","volume":"15","author":"corin","year":"2007","journal-title":"Journal of Computer Security"},{"key":"29","first-page":"326","article-title":"An improved constraint-based system for the verification of security protocols","volume":"2477","author":"corin","year":"2002","journal-title":"LNCS"},{"key":"3","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1145\/381677.381696","article-title":"SPINS: Security Protocols for Sensor Networks","author":"perrig","year":"2001","journal-title":"Proceedings of the 7thAnnual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom) Rome Italy"},{"key":"2","first-page":"117","article-title":"From specification languages to timed automata","volume":"161","author":"doro's","year":"2002","journal-title":"Informatik-Berichte 212"},{"journal-title":"Constraints and approaches for distributed sensor network security","year":"2000","author":"carman","key":"10"},{"key":"1","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/11513988_27","article-title":"The AVISPA tool for the automated validation of internet security protocols and applications","volume":"3576","author":"armando","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"30","first-page":"114","article-title":"A simple language for realtime cryptographic protocol analysis","volume":"2618","author":"gorrieri","year":"2003","journal-title":"LNCS"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/11539452_18"},{"journal-title":"Scyther - Semantics and Verification of Security Protocols","year":"2006","author":"cremers","key":"6"},{"journal-title":"A Calculus of Communicating Systems","year":"1982","author":"milner","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212709"},{"journal-title":"Communicating and Mobile Systems The pi-calculus","year":"1999","author":"milner","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2005.8"},{"journal-title":"Communicating Sequential Processes","year":"1985","author":"hoare","key":"9"},{"journal-title":"Kommunikation mit Automaten","year":"1962","author":"petri","key":"8"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122838.pdf?arnumber=6122838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T13:39:40Z","timestamp":1686663580000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122838\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122838","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}