{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:11:27Z","timestamp":1725484287237},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540431596"},{"type":"electronic","value":"9783540456452"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45645-7_2","type":"book-chapter","created":{"date-parts":[[2007,5,28]],"date-time":"2007-05-28T22:24:22Z","timestamp":1180391062000},"page":"21-47","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Algebraic Abstractions"],"prefix":"10.1007","author":[{"given":"Michel","family":"Bidoit","sequence":"first","affiliation":[]},{"given":"Alexandre","family":"Boisseau","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,1,29]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"E. Astesiano, M. Broy, and G. Reggio. Algebraic specification of concurrent systems. chapter 13 in [2], pages 467\u2013520, 1999.","DOI":"10.1007\/978-3-642-59851-7_13"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"E. Astesiano, H.-J. Kreowski, and B. Krieg-Br\u00fcckner, editors. Algebraic Foundations of Systems Specification. Springer, 1999.","DOI":"10.1007\/978-3-642-59851-7"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"B. B\u00e9rard, M. Bidoit, A. Finkel, F. Laroussinie, A. Petit, L. Petrucci and P. Schnoebelen. Systems and Software Verification. Springer, July 2001.","DOI":"10.1007\/978-3-662-04558-9"},{"key":"2_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/3-540-63166-6_15","volume-title":"Towards a mechanization of cryptographic protocol verification","author":"D. Bolignano","year":"1997","unstructured":"D. Bolignano. Towards a mechanization of cryptographic protocol verification. In Proc. 9th Int. Conf. Computer Aided Verification (CAV\u201997), Haifa, Israel, June 1997, volume 1254 of Lecture Notes in Computer Science, pages 131\u2013142. Springer, 1997."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"D. Bolignano. Using abstract interpretation for the safe verification of security protocols. In MFPS XV Mathematical Foundations of Programming Semantics, Fifteenth Conference, Tulane University, New Orleans, LA, April 28\u2013May 1, 1999, volume 20 of Electronic Notes in Theor. Comp. Sci. Elsevier Science, 1999.","DOI":"10.1016\/S1571-0661(04)80069-0"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"E. M. Clarke, O. Grumberg, and D. E. Long. Model checking and abstraction. In Proceedings of the Nineteenth Annual ACM Symposium on Principles of Programming Languages (POPL\u201992), Albuquerque, New Mexico, January 19\u201322, 1992, pages 343\u2013354. ACM Press, 1992.","DOI":"10.1145\/143165.143235"},{"key":"2_CR7","unstructured":"Co.: The common framework initiative for algebraic specification and development. \n http:\/\/www.brics.dk\/Projects\/CoFI\/\n \n ."},{"issue":"2\u20133","key":"2_CR8","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/0743-1066(92)90030-7","volume":"13","author":"P. Cousot","year":"1992","unstructured":"P. Cousot and R. Cousot. Abstract interpretation and application to logic programs. Journal of Logic Programming, 13(2\u20133):103\u2013179, 1992.","journal-title":"Journal of Logic Programming"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"D. Dams, R. Gerth, and O. Grumberg. Abstract interpretation of reactive systems. In ACM Transactions on Programming Languages ans Systems, volume 19, 1997.","DOI":"10.1145\/244795.244800"},{"issue":"2","key":"2_CR10","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(2):198\u2013208, 1983.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1007\/3-540-45591-4_134","volume-title":"A method for automatic cryptographic protocol verification (extended abstract)","author":"J. Goubault-Larrecq","year":"2000","unstructured":"J. Goubault-Larrecq. A method for automatic cryptographic protocol verification (extended abstract). In Proc. 15th IPDPS 2000 Workshops, Cancun, Mexico, May 2000, volume 1800 of Lecture Notes in Computer Science, pages 977\u2013984. Springer, 2000."},{"key":"2_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/3-540-63875-X_41","volume-title":"Advances in Computing Science (ASIAN\u201997)","author":"S. Merz","year":"1997","unstructured":"S. Merz. Rules for abstraction. In R. K. Shyamasundar and K. Ueda, editors, Advances in Computing Science (ASIAN\u201997), volume 1345 of LNCS, pages 32\u201345, Berlin, Germany, 1997. Springer."},{"key":"2_CR13","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L. C. Paulson","year":"1998","unstructured":"L. C. Paulson. The inductive approach to verifying cryptographic protocols. J. Computer Security, 6:85\u2013128, 1998.","journal-title":"J. Computer Security"},{"key":"2_CR14","unstructured":"A. Tarlecki. Towards heterogeneous specifications. In Proc. Workshop on Frontiers of Combining Systems FroCoS\u201998,Amsterdam, October 1998, Applied Logic Series. Kluwer Academic Publishers, 1998. (To appear)."}],"container-title":["Lecture Notes in Computer Science","Recent Trends in Algebraic Development Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45645-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:22:53Z","timestamp":1558257773000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45645-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540431596","9783540456452"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-45645-7_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"29 January 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}