{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:50Z","timestamp":1750307210034,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,1,24]],"date-time":"2012-01-24T00:00:00Z","timestamp":1327363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,1,24]]},"DOI":"10.1145\/2103776.2103781","type":"proceedings-article","created":{"date-parts":[[2012,1,24]],"date-time":"2012-01-24T16:47:19Z","timestamp":1327423639000},"page":"27-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Formal network packet processing with minimal fuss"],"prefix":"10.1145","author":[{"given":"Reynald","family":"Affeldt","sequence":"first","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Tsukuba, Japan"}]},{"given":"David","family":"Nowak","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Tsukuba, Japan"}]},{"given":"Yutaka","family":"Oiwa","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Tsukuba, Japan"}]}],"member":"320","published-online":{"date-parts":[[2012,1,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328487"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1929529.1929536"},{"volume-title":"Addison-Wesley","year":"1975","author":"Burge W. H.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard) Aug. 2008. Updated by RFCs 5746 5878 6176.  T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard) Aug. 2008. Updated by RFCs 5746 5878 6176.","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065046"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/227699.227700"},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-59451-5_3","volume-title":"Proceedings of the First International Spring School on Advanced Functional Programming Techniques","author":"Hughes J.","year":"1995"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796898003050"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/772970.772974"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987211.1987231"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706347"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273009"},{"volume-title":"Revised Selected Papers of the Eight Symposium on Trends in Functional Programming (TFP 2007)","year":"2007","author":"Mandelbaum Y.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(91)90052-4"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411204.1411213"},{"key":"e_1_3_2_1_17_1","unstructured":"J. Postel. Transmission Control Protocol. RFC 793 (Standard) Sept. 1981. Updated by RFCs 1122 3168 6093.  J. Postel. Transmission Control Protocol. RFC 793 (Standard) Sept. 1981. Updated by RFCs 1122 3168 6093."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1863523.1863525"},{"volume-title":"Addison-Wesley","year":"2001","author":"Rescorla E.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71067-7_23"},{"key":"e_1_3_2_1_21_1","unstructured":"The Coq Development Team. The Coq Proof Assistant Reference Manual version 8.3 2010.  The Coq Development Team. The Coq Proof Assistant Reference Manual version 8.3 2010."},{"key":"e_1_3_2_1_22_1","unstructured":"The OpenSSL Project. OpenSSL: Cryptography and SSL\/TLS Toolkit. http:\/\/www.openssl.org.  The OpenSSL Project. OpenSSL: Cryptography and SSL\/TLS Toolkit. http:\/\/www.openssl.org."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/91556.91592"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-91518-7_11"}],"event":{"name":"POPL '12: The 39th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Philadelphia Pennsylvania USA","acronym":"POPL '12"},"container-title":["Proceedings of the sixth workshop on Programming languages meets program verification"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2103776.2103781","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2103776.2103781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:35Z","timestamp":1750241195000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2103776.2103781"}},"subtitle":["invertible syntax descriptions at work"],"short-title":[],"issued":{"date-parts":[[2012,1,24]]},"references-count":23,"alternative-id":["10.1145\/2103776.2103781","10.1145\/2103776"],"URL":"https:\/\/doi.org\/10.1145\/2103776.2103781","relation":{},"subject":[],"published":{"date-parts":[[2012,1,24]]},"assertion":[{"value":"2012-01-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}