iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/978-3-540-85762-4_8
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:23:22Z","timestamp":1725517402599},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540857617"},{"type":"electronic","value":"9783540857624"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85762-4_8","type":"book-chapter","created":{"date-parts":[[2008,8,22]],"date-time":"2008-08-22T14:20:29Z","timestamp":1219414829000},"page":"111-125","source":"Crossref","is-referenced-by-count":5,"title":["Refinement of Kripke Models for Dynamics"],"prefix":"10.1007","author":[{"given":"Francien","family":"Dechesne","sequence":"first","affiliation":[]},{"given":"Simona","family":"Orzan","sequence":"additional","affiliation":[]},{"given":"Yanjing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"8_CR1","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1023\/B:SYNT.0000024912.56773.5e","volume":"139","author":"A. Baltag","year":"2004","unstructured":"Baltag, A., Moss, L.S.: Logics for epistemic programs. Synthese\u00a0139(2), 165\u2013224 (2004)","journal-title":"Synthese"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"van Benthem, J., van Eijck, J., Kooi, B.: Logics of communication and change. Information and Computation (2006)","DOI":"10.1016\/j.ic.2006.04.006"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Automata, Languages and Programming","author":"G. Bruns","year":"2004","unstructured":"Bruns, G., Godefroid, P.: Model checking with multi-valued logics. In: D\u00edaz, J., Karhum\u00e4ki, J., Lepist\u00f6, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol.\u00a03142. Springer, Heidelberg (2004)"},{"volume-title":"Practical Cryptography for Data Internetworks","year":"1996","author":"M. Burrows","key":"8_CR4","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. In: Practical Cryptography for Data Internetworks. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"8_CR5","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75560-9_18","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"F. Dechesne","year":"2007","unstructured":"Dechesne, F., Mousavi, M., Orzan, S.M.: Operational and epistemic approaches to protocol analysis: Bridging the gap. In: Dershowitz, N., Voronkov, A. (eds.) LPAR 2007. LNCS (LNAI), vol.\u00a04790. Springer, Heidelberg (2007)"},{"key":"8_CR6","unstructured":"Dechesne, F., Wang, Y.: Dynamic epistemic verification of security protocols: framework and case study. In: A Meeting of the minds: Proceedings LORI workshop. Texts in Computer Science, pp. 129\u2013144 (2007)"},{"key":"8_CR7","unstructured":"van Eijck, J.: DEMO program and documentation (2005), http:\/\/www.cwi.nl\/~jve\/demo\/"},{"volume-title":"Reasoning About Knowledge","year":"1995","author":"R. Fagin","key":"8_CR8","unstructured":"Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y.: Reasoning About Knowledge. MIT Press, Cambridge (1995)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-45657-0_11","volume-title":"Computer Aided Verification","author":"P. Godefroid","year":"2002","unstructured":"Godefroid, P., Jagadeesan, R.: Automatic abstraction using generalized model checking. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol.\u00a02404, pp. 137\u2013150. Springer, Heidelberg (2002)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Halpern, J.Y., O\u2019Neill, K.R.: Anonymity and information hiding in multiagent systems. Journal of Computer Security, 483\u2013514 (2005)","DOI":"10.3233\/JCS-2005-13305"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/3-540-46017-9_9","volume-title":"Model Checking Software","author":"W. Hoek van der","year":"2002","unstructured":"van der Hoek, W., Wooldridge, M.: Model checking knowledge and time. In: Bo\u0161na\u010dki, D., Leue, S. (eds.) SPIN 2002. LNCS, vol.\u00a02318, pp. 95\u2013111. Springer, Heidelberg (2002)"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s11229-004-2247-0","volume":"142","author":"A. Hommersom","year":"2004","unstructured":"Hommersom, A., Meyer, J.-J., de Vink, E.P.: Update semantics of security protocols. Synthese\u00a0142, 229\u2013267 (2004); Knowledge, Rationality and Action subseries","journal-title":"Synthese"},{"issue":"1","key":"8_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/JCS-2004-12102","volume":"12","author":"D. Hughes","year":"2004","unstructured":"Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security\u00a012(1), 3\u201336 (2004)","journal-title":"Journal of Computer Security"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Programming Languages and Systems","author":"M. Huth","year":"2001","unstructured":"Huth, M., Jagadeesan, R., Schmidt, D.: Modal transition systems: A foundation for three-valued program analysis. In: Sands, D. (ed.) ESOP 2001. LNCS, vol.\u00a02028. Springer, Heidelberg (2001)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Larsen, K.G.: Modal specifications. In: Automatic Verification Methods for Finite State Systems, pp. 232\u2013246 (1989)","DOI":"10.1007\/3-540-52148-8_19"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Larsen, K.G., Thomsen, B.: A modal process logic. In: Proceedings LICS, pp. 203\u2013210 (1988)","DOI":"10.1109\/LICS.1988.5119"},{"key":"8_CR17","first-page":"280","volume-title":"Proc. CSFW 2004","author":"R. Meyden van der","year":"2004","unstructured":"van der Meyden, R., Su, K.: Symbolic model checking the knowledge of the dining cryptographers. In: Proc. CSFW 2004, pp. 280\u2013291. IEEE, Los Alamitos (2004)"},{"key":"8_CR18","unstructured":"Plaza, J.A.: Logics of public communications. In: Proceedings ISMIS 1989, pp. 201\u2013216 (1989)"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Raimondi, F., Lomuscio, A.: Automatic verification of deontic interpreted systems by model checking via OBDD\u2019s. Journal of Applied Logic (2006)","DOI":"10.1016\/j.jal.2005.12.010"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/978-3-540-27815-3_32","volume-title":"Algebraic Methodology and Software Technology","author":"J.C. Pol van de","year":"2004","unstructured":"van de Pol, J.C., Valero Espada, M.: Modal abstractions in \u03bcCRL*. In: AMAST, pp. 409\u2013425 (2004)"},{"key":"8_CR21","series-title":"Synthese Library","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4020-5839-4","volume-title":"Dynamnic Epistemic Logic","author":"H. Ditmarsch van","year":"2008","unstructured":"van Ditmarsch, H., van der Hoek, W., Kooi, B.: Dynamnic Epistemic Logic. Synthese Library, vol.\u00a0337. Springer, Heidelberg (2008)"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"van Eijck, J., Orzan, S.M.: Epistemic verification of anonymity. ENTCS, 168 (2007)","DOI":"10.1016\/j.entcs.2006.08.026"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing - ICTAC 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85762-4_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T18:11:56Z","timestamp":1684519916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85762-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540857617","9783540857624"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85762-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}