{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T16:11:08Z","timestamp":1692979868145},"reference-count":20,"publisher":"International Academy Publishing (IAP)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.6.7.1181-1187","type":"journal-article","created":{"date-parts":[[2011,12,27]],"date-time":"2011-12-27T16:22:32Z","timestamp":1325002952000},"source":"Crossref","is-referenced-by-count":1,"title":["Modeling and Analysis of Electronic Commerce Protocols Using Colored Petri Nets"],"prefix":"10.17706","volume":"6","author":[{"given":"Yang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Xiao Yao","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Huan Guo","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2011,7,1]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1145\/168588.168601","article-title":"NetCash: a design for practical electronic currency on the Internet","volume-title":"Proc. 1st ACM Conf. Computer and Communications Security","author":"Medvinsky","year":"1993"},{"key":"ref2","first-page":"77","article-title":"NetBill security and transaction protocol","volume-title":"Proc. 1st USENIX Workshop in Electronic Commerce","author":"Cox","year":"1995"},{"key":"ref3","first-page":"55","article-title":"A fair non-repudiation protocol","volume-title":"IEEE Symposium on Security and Privacy","author":"Zhou","year":"1996"},{"issue":"no. 12","key":"ref4","first-page":"1628","article-title":"A fair non repudiation cryptographic protocol and its formal analysis and applications","volume":"11","author":"Li","year":"2008","journal-title":"J. Softw.","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"issue":"no. 9","key":"ref5","first-page":"1422","article-title":"A fair non-repudiation protocol and its formal analysis","volume":"31","author":"Liu","year":"2003","journal-title":"Acta Electronica Sinica"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/32.502224"},{"issue":"no. 12","key":"ref7","first-page":"1238","article-title":"Limitations of Kailar Logic","volume":"10","author":"Zhou","year":"1999","journal-title":"J. Softw.","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"issue":"no. 9","key":"ref8","first-page":"1318","article-title":"A new approach for the analysis of electronic commerce protocols","volume":"12","author":"Zhou","year":"2001","journal-title":"J. Softw.","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2008.4525423"},{"key":"ref10","first-page":"448","article-title":"Extending Rubin logic for electronic commerce protocols","volume-title":"Proc. 2nd International Conference on Anti-counterfeiting, Security, and Identification","author":"Xu","year":"2008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.468"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-60794-3","volume-title":"Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use","volume":"1-3","author":"Jensen","year":"1997"},{"key":"ref13","first-page":"194","article-title":"Computer analysis of cryptographic protocols using Coloured Petri Nets","volume-title":"18th Biennial Symposium on Communication","author":"Doyle","year":"1996"},{"issue":"no.11","key":"ref14","first-page":"1926","article-title":"Formal analysis of security protocol using Petri Nets","volume":"32","author":"Liu","year":"2004","journal-title":"Acta Electronica Sinica"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.6.1.19-27"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1360\/crad20050918"},{"issue":"no. 6","key":"ref17","first-page":"1445","article-title":"Analysis of fairness in payment protocols based on Hierarchical Timed Coloured Petri Nets","volume":"31","author":"Liu","year":"2009","journal-title":"Journal of Electronics & Information Technology"},{"key":"ref18","first-page":"77","article-title":"NetBill Security and Transaction Protocol","volume-title":"Proc. 1st USENIX Workshop on Electronic Commerce","author":"Cox","year":"1995"},{"key":"ref19","volume-title":"The Internet Billing Server Transaction Protocol Alternatives, Tech Rep: INITR-1","author":"O\u2019Toole","year":"1994"},{"issue":"no. 9","key":"ref20","first-page":"93","article-title":"A new electronic payment protocol and its formal analysis","volume":"25","author":"Xu","year":"2008","journal-title":"Computer Applications and Software"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T11:56:35Z","timestamp":1497959795000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/4176"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,1]]},"references-count":20,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2011,7,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.6.7.1181-1187","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2011,7,1]]}}}