{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:25:17Z","timestamp":1729614317614,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/csf.2015.20","type":"proceedings-article","created":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T17:35:20Z","timestamp":1441647320000},"page":"185-198","source":"Crossref","is-referenced-by-count":9,"title":["Set-Pi: Set Membership p-Calculus"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Bruni","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Modersheim","sequence":"additional","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"347","DOI":"10.3233\/JCS-2005-13302","article-title":"Static validation of security protocols","volume":"13","author":"bodei","year":"2005","journal-title":"Journal of Computer Security"},{"journal-title":"SetPi tool page","year":"0","author":"bruni","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10181-1_15"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03459-6_7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.21"},{"key":"ref16","article-title":"CANAuth-A simple, backward compatible broadcast authentication protocol for CAN bus","author":"van herrewege","year":"2011","journal-title":"Proc ECRYPT"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.18"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596782"},{"key":"ref19","article-title":"The TAMARIN prover for the symbolic analysis of security protocols","author":"meier","year":"2013","journal-title":"Computer Aided Verification"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0041-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28756-5_19"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930138"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.37"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2005.05.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45789-5_25"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"743","DOI":"10.3233\/JCS-140501","article-title":"Statverif: Verification of stateful processes","volume":"22","author":"arapinis","year":"2014","journal-title":"Journal of Computer Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/360204.360213"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"363","DOI":"10.3233\/JCS-2009-0339","article-title":"Automatic verification of correspondences for security protocols","volume":"17","author":"blanchet","year":"2009","journal-title":"Journal of Computer Security"},{"key":"ref20","article-title":"Abstraction by set-membership: verifying security protocols and web services with databases","author":"m\u00f6dersheim","year":"2010","journal-title":"Computer and communications security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796813000142"},{"key":"ref21","article-title":"Deciding security for a fragment of aslan","author":"m\u00f6dersheim","year":"2012","journal-title":"European symposium on research in computer security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48660-7_29"},{"journal-title":"The AVISPA Project AVISPA Project Deliverable 2 3 The Intermediate Format","year":"2003","key":"ref23"}],"event":{"name":"2015 IEEE 28th Computer Security Foundations Symposium (CSF)","start":{"date-parts":[[2015,7,13]]},"location":"Verona","end":{"date-parts":[[2015,7,17]]}},"container-title":["2015 IEEE 28th Computer Security Foundations Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7243288\/7243713\/07243733.pdf?arnumber=7243733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T03:36:13Z","timestamp":1567136173000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7243733\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/csf.2015.20","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}