{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:27:56Z","timestamp":1761596876305,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/time.2004.1314432","type":"proceedings-article","created":{"date-parts":[[2004,11,13]],"date-time":"2004-11-13T00:14:14Z","timestamp":1100304854000},"page":"148-151","source":"Crossref","is-referenced-by-count":10,"title":["Using temporal logics of knowledge in the formal verification of security protocols"],"prefix":"10.1109","author":[{"given":"C.","family":"Dixon","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.-C.F.","family":"Gago","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Fisher","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"W.","family":"van der Hoek","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","article-title":"The Temporal Logic of Actions","author":"lamport","year":"1991","journal-title":"Technical Report Research Report 79"},{"key":"ref11","first-page":"147","article-title":"Breaking and Fixing the Needham-Schroeder Public-key Protocol Using csp and fdr","volume":"1055","author":"lowe","year":"1996","journal-title":"Tools and Algorithms for the Construction and Analysis of Systems second international work-shop TACAS '96"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596775"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168600"},{"key":"ref4","article-title":"Using temporal logics of knowledge in the formal verification of security protocols","author":"dixon","year":"2003","journal-title":"Technical Report ULCS-03&#x2013;022 University of Liverpool Department of Computer Science"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/8.3.345"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/146937.146940"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/10722599_14"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1995.518557"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63854"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIME.2000.856587"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/74850.74852"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(89)90039-1"}],"event":{"name":"Proceedings. 11th International Symposium on Temporal Representation and Reasoning, 2004. TIME 2004.","start":{"date-parts":[[2004,7,3]]},"location":"Tatihou, Normandie, France","end":{"date-parts":[[2004,7,3]]}},"container-title":["Proceedings. 11th International Symposium on Temporal Representation and Reasoning, 2004. TIME 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9184\/29135\/01314432.pdf?arnumber=1314432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T04:55:54Z","timestamp":1489467354000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1314432\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/time.2004.1314432","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}