{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:27:19Z","timestamp":1750746439447,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,12]],"date-time":"2011-07-12T00:00:00Z","timestamp":1310428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA2386-09-1-4156"],"award-info":[{"award-number":["FA2386-09-1-4156"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,12]]},"DOI":"10.1145\/2000378.2000408","type":"proceedings-article","created":{"date-parts":[[2011,7,15]],"date-time":"2011-07-15T12:25:09Z","timestamp":1310732709000},"page":"247-256","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Abstraction for epistemic model checking of dining cryptographers-based protocols"],"prefix":"10.1145","author":[{"given":"Omar","family":"Al Bataineh","sequence":"first","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"given":"Ron","family":"van der Meyden","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2011,7,12]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"352","volume-title":"Proc. Conf. on Foundations of Software Technology and Theoretical Computer Science","author":"Backes M.","year":"2010","unstructured":"M. Backes , M. Maffei , and E. Mohammadi . Computationally sound abstraction and verification of secure multi-party computations . In Proc. Conf. on Foundations of Software Technology and Theoretical Computer Science , pages 352 -- 363 , 2010 . M. Backes, M. Maffei, and E. Mohammadi. Computationally sound abstraction and verification of secure multi-party computations. In Proc. Conf. on Foundations of Software Technology and Theoretical Computer Science, pages 352--363, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1007\/978-3-642-16161-2_25"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.5555\/54235.54239"},{"key":"e_1_3_2_1_4_1","first-page":"721","volume-title":"IJCAI","author":"Cohen M.","year":"2009","unstructured":"M. Cohen , M. Dam , A. Lomuscio , and H. Qu . A symmetry reduction technique for model checking temporal-epistemic logic . In IJCAI , pages 721 -- 726 , 2009 . M. Cohen, M. Dam, A. Lomuscio, and H. Qu. A symmetry reduction technique for model checking temporal-epistemic logic. In IJCAI, pages 721--726, 2009."},{"key":"e_1_3_2_1_5_1","first-page":"945","volume-title":"8th Int. Joint Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2009","volume":"2","author":"Cohen M.","year":"2009","unstructured":"M. Cohen , M. Dam , A. Lomuscio , and F. Russo . Abstraction in model checking multi-agent systems . In 8th Int. Joint Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2009 ), Vol. 2 , pages 945 -- 952 , 2009 . M. Cohen, M. Dam, A. Lomuscio, and F. Russo. Abstraction in model checking multi-agent systems. In 8th Int. Joint Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2009), Vol. 2, pages 945--952, 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-540-85762-4_8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5803.001.0001","volume-title":"Reasoning about Knowledge","author":"Fagin R.","year":"1995","unstructured":"R. Fagin , J. Y. Halpern , Y. Moses , and M. Y. Vardi . Reasoning about Knowledge . MIT Press , Cambridge, Mass ., 1995 . R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi. Reasoning about Knowledge. MIT Press, Cambridge, Mass., 1995."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1007\/978-3-540-27813-9_41"},{"key":"e_1_3_2_1_9_1","volume-title":"Herbivore: A scalable and efficient protocol for anonymous communication. Technical report","author":"Goel S.","year":"2003","unstructured":"S. Goel , M. Robson , M. Polte , and E. Sirer . Herbivore: A scalable and efficient protocol for anonymous communication. Technical report , Cornell University , Ithaca, NY , February 2003 . S. Goel, M. Robson, M. Polte, and E. Sirer. Herbivore: A scalable and efficient protocol for anonymous communication. Technical report, Cornell University, Ithaca, NY, February 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/79147.79161"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/146637.146638"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. Workshop on Model Checking and Artificial Intelligence, AAAI-2010","author":"Luo X.","year":"2010","unstructured":"X. Luo , K. Su , M. Gu , L. Wu , and J. Yang . Symbolic model checking the knowledge in herbivore protocol . In Proc. Workshop on Model Checking and Artificial Intelligence, AAAI-2010 , 2010 . X. Luo, K. Su, M. Gu, L. Wu, and J. Yang. Symbolic model checking the knowledge in herbivore protocol. In Proc. Workshop on Model Checking and Artificial Intelligence, AAAI-2010, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.5555\/1009380.1009683"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1324249.1324278"},{"key":"e_1_3_2_1_15_1","first-page":"690","volume-title":"Proc. Eurocrypt'89","author":"Waidner M.","year":"1989","unstructured":"M. Waidner and B. Pfitzmann . The Dining Cryptographers in the disco: unconditional sender and recipient untraceability with computationally secure serviceability . In Proc. Eurocrypt'89 , page 690 , 1989 . M. Waidner and B. Pfitzmann. The Dining Cryptographers in the disco: unconditional sender and recipient untraceability with computationally secure serviceability. In Proc. Eurocrypt'89, page 690, 1989."}],"event":{"acronym":"TARK XIII","name":"TARK XIII: Thirteenth conference on Theoretical Aspects of Rationality and Knowledge","location":"Groningen The Netherlands"},"container-title":["Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000378.2000408","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2000378.2000408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:00:00Z","timestamp":1750244400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000378.2000408"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,12]]},"references-count":15,"alternative-id":["10.1145\/2000378.2000408","10.1145\/2000378"],"URL":"https:\/\/doi.org\/10.1145\/2000378.2000408","relation":{},"subject":[],"published":{"date-parts":[[2011,7,12]]},"assertion":[{"value":"2011-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}