{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:20:31Z","timestamp":1740115231196,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.3233\/978-1-60750-714-7-1","type":"book-chapter","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T09:38:17Z","timestamp":1740044297000},"source":"Crossref","is-referenced-by-count":0,"title":["Introduction"],"prefix":"10.3233","author":[{"family":"Cortier V&eacute;ronique","sequence":"additional","affiliation":[]},{"family":"Kremer Steve","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["Cryptology and Information Security Series","Formal Models and Techniques for Analyzing Security Protocols"],"original-title":[],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T09:43:39Z","timestamp":1740044619000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISSNISBN&issn=1871-6431&volume=5&spage=1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-60750-714-7-1","relation":{},"ISSN":["1871-6431"],"issn-type":[{"value":"1871-6431","type":"print"}],"subject":[],"published":{"date-parts":[[2011]]}}}