{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T07:50:54Z","timestamp":1719215454439},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2008,10,8]],"date-time":"2008-10-08T00:00:00Z","timestamp":1223424000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1007\/s11235-008-9131-z","type":"journal-article","created":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T13:33:28Z","timestamp":1223386408000},"page":"91-99","source":"Crossref","is-referenced-by-count":13,"title":["Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK"],"prefix":"10.1007","volume":"40","author":[{"given":"Llanos","family":"Tobarra","sequence":"first","affiliation":[]},{"given":"Diego","family":"Cazorla","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Cuartero","sequence":"additional","affiliation":[]},{"given":"Gregorio","family":"D\u00edaz","sequence":"additional","affiliation":[]},{"given":"Emilia","family":"Cambronero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,10,8]]},"reference":[{"key":"9131_CR1","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"CAV","author":"A. Armando","year":"2005","unstructured":"Armando, A., Basin, D. A., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P. H., H\u00e9am, P. C., Kouchnarenko, O., Mantovani, J., M\u00f6dersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Vigan\u00f2, L., & Vigneron, L. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In K. Etessami & S. K. Rajamani (Eds.), Lecture notes in computer science : Vol. 3576. CAV (pp. 281\u2013285). Berlin: Springer."},{"key":"9131_CR2","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/11690634_29","volume-title":"FoSSaCS","author":"M. Backes","year":"2006","unstructured":"Backes, M., M\u00f6dersheim, S., Pfitzmann, B., & Vigan\u00f2, L. (2006). Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. In L. Aceto & A. Ing\u00f3lfsd\u00f3ttir (Eds.), Lecture notes in computer science : Vol. 3921. FoSSaCS (pp. 428\u2013445). Berlin: Springer."},{"key":"9131_CR3","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1109\/SFCS.1997.646128","volume-title":"Proceedings of 38th annual symposium on foundations of computer science","author":"M. Bellare","year":"1997","unstructured":"Bellare, M., Desai, A., Jokipii, E., & Rogaway, P. (1997). A concrete security treatment of symmetric encryption. In Proceedings of 38th annual symposium on foundations of computer science (pp. 394\u2013403). New York: IEEE."},{"issue":"3","key":"9131_CR4","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Kilian, J., & Rogaway, P. (2000). The security of the cipher block chaining message authentication code. Journal of Computer and Systems Sciences, 61(3), 362\u2013399.","journal-title":"Journal of Computer and Systems Sciences"},{"key":"9131_CR5","first-page":"268","volume-title":"ACM conference on computer and communications security","author":"K. Bhargavan","year":"2004","unstructured":"Bhargavan, K., Fournet, C., & Gordon, A. D. (2004). Verifying policy-based security for web services. In V. Atluri, B. Pfitzmann, & P. D. McDaniel (Eds.), ACM conference on computer and communications security (pp. 268\u2013277). New York: Assoc. Comput. Mach."},{"key":"9131_CR6","first-page":"197","volume-title":"IEEE symposium on security and privacy","author":"H. Chan","year":"2003","unstructured":"Chan, H., Perrig, A., & Song, D. X. (2003). Random key predistribution schemes for sensor networks. In IEEE symposium on security and privacy (p. 197). Los Alamitos: IEEE Comput. Soc."},{"key":"9131_CR7","unstructured":"Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P. H., Mantovani, J., M\u00f6dersheim, S., & Vigneron, L. (2004) A high level protocol specification language for industrial security-sensitive protocols. In Proceedings of workshop on specification and automated processing of security requirements (SAPS) (pp. 193\u2013205)."},{"key":"9131_CR8","volume-title":"Model checking","author":"E. M. Clarke","year":"1999","unstructured":"Clarke, E. M., Grumberg, O., & Peled, D. A. (1999). Model checking. Cambridge: MIT Press."},{"key":"9131_CR9","first-page":"350","volume-title":"FOCS","author":"D. Dolev","year":"1981","unstructured":"Dolev, D., & Yao, A. C. C. (1981). On the security of public key protocols. In FOCS (pp. 350\u2013357). New York: IEEE."},{"key":"9131_CR10","first-page":"41","volume-title":"ACM conference on computer and communications security","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., & Gligor, V. (2002). A key-management scheme for distributed sensor networks. In V. Atluri (Ed.), ACM conference on computer and communications security (pp. 41\u201347). New York: Assoc. Comput. Mach."},{"key":"9131_CR11","unstructured":"Glouche, Y., Genet, T., Heen, O., & Courtay, O. (2006). A security protocol animator tool for AVISPA. In ARTIST2 workshop on security specification and verification of embedded systems, Pisa."},{"issue":"2","key":"9131_CR12","doi-asserted-by":"crossref","first-page":"217","DOI":"10.3233\/JCS-2003-11204","volume":"11","author":"J. Heather","year":"2003","unstructured":"Heather, J., Lowe, G., & Schneider, S. (2003). How to prevent type flaw attacks on security protocols. Journal of Computer Security, 11(2), 217\u2013244.","journal-title":"Journal of Computer Security"},{"key":"9131_CR13","doi-asserted-by":"crossref","unstructured":"Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D. E., & Pister, K. S. J. (2000). System architecture directions for networked sensors. In Inter. conf. on architectural support for programming languages and operating systems, ASPLOS (pp.\u00a093\u2013104).","DOI":"10.1145\/378993.379006"},{"key":"9131_CR14","first-page":"162","volume-title":"Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys 2004","author":"C. Karlof","year":"2004","unstructured":"Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys 2004 (pp. 162\u2013175). Baltimore, MD, USA, November 3\u20135, 2004. New York: Assoc. Comput. Mach."},{"issue":"1\u20132","key":"9131_CR15","doi-asserted-by":"crossref","first-page":"53","DOI":"10.3233\/JCS-1998-61-204","volume":"6","author":"G. Lowe","year":"1998","unstructured":"Lowe, G. (1998). Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(1\u20132), 53\u201384.","journal-title":"Journal of Computer Security"},{"key":"9131_CR16","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/BFb0028734","volume-title":"CAV","author":"J. C. Mitchell","year":"1998","unstructured":"Mitchell, J. C. (1998). Finite-state analysis of security protocols. In A. J. Hu & M. Y. Vardi (Eds.), Lecture notes in computer science : Vol. 1427. CAV (pp. 71\u201376). Berlin: Springer."},{"issue":"6","key":"9131_CR17","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J. A., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53\u201357.","journal-title":"Communications of the ACM"},{"issue":"5","key":"9131_CR18","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521\u2013534.","journal-title":"Wireless Networks"},{"key":"9131_CR19","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/11549970_16","volume-title":"EPEW\/WS-FM","author":"M. L. Tobarra","year":"2005","unstructured":"Tobarra, M. L., Cazorla, D., Cuartero, F., & Diaz, G. (2005). Application of formal methods to the analysis of web services security. In M. Bravetti, L. Kloul, & G. Zavattaro (Eds.), Lecture notes in computer science : Vol. 3670. EPEW\/WS-FM (pp. 215\u2013229). Berlin: Springer."},{"key":"9131_CR20","first-page":"57","volume-title":"Proc. of IADIS international conference on applied computing (AC\u201906)","author":"M. L. Tobarra","year":"2006","unstructured":"Tobarra, M. L., Cazorla, D., Cuartero, F., & Diaz, G. (2006). Formal verification of TLS handshake and extensions for wireless networks. In Proc. of IADIS international conference on applied computing (AC\u201906) (pp. 57\u201364). San Sebastian: IADIS."},{"key":"9131_CR21","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1145\/1029102.1029113","volume-title":"SASN\u201904: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks","author":"R. Watro","year":"2004","unstructured":"Watro, R., Kong, D., Cuti, S. F., Gardiner, C., Lynn, C., & Kruus, P. (2004). Tinypk: securing sensor networks with public key technology. In SASN\u201904: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (pp. 59\u201364). New York: Assoc. Comput. Mach. doi: 10.1145\/1029102.1029113 , http:\/\/portal.acm.org\/citation.cfm?id=1029113 ."},{"key":"9131_CR22","first-page":"62","volume-title":"ACM conference on computer and communications security","author":"S. Zhu","year":"2003","unstructured":"Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In S. Jajodia, V. Atluri, & T. Jaeger (Eds.), ACM conference on computer and communications security (pp. 62\u201372). New York: Assoc. Comput. Mach."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-008-9131-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-008-9131-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-008-9131-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:47:12Z","timestamp":1559386032000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-008-9131-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,8]]},"references-count":22,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2009,4]]}},"alternative-id":["9131"],"URL":"https:\/\/doi.org\/10.1007\/s11235-008-9131-z","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,10,8]]}}}