{"id":"https://openalex.org/W2100477026","doi":"https://doi.org/10.1007/11526841_21","title":"Formal Verification of Security Properties of Smart Card Embedded Source Code","display_name":"Formal Verification of Security Properties of Smart Card Embedded Source Code","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W2100477026","doi":"https://doi.org/10.1007/11526841_21","mag":"2100477026"},"language":"en","primary_location":{"id":"doi:10.1007/11526841_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11526841_21","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069964343","display_name":"June Andronick","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"June Andronick","raw_affiliation_strings":["Axalto, Smart Cards Research, 36-38, rue de la Princesse, BP45, Louveciennes Cedex, 78431, France"],"affiliations":[{"raw_affiliation_string":"Axalto, Smart Cards Research, 36-38, rue de la Princesse, BP45, Louveciennes Cedex, 78431, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089191895","display_name":"Boutheina Chetali","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Boutheina Chetali","raw_affiliation_strings":["Axalto, Smart Cards Research, 36-38, rue de la Princesse, BP45, Louveciennes Cedex, 78431, France"],"affiliations":[{"raw_affiliation_string":"Axalto, Smart Cards Research, 36-38, rue de la Princesse, BP45, Louveciennes Cedex, 78431, France","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024401238","display_name":"Christine Paulin-Mohring","orcid":null},"institutions":[{"id":"https://openalex.org/I4210144804","display_name":"Laboratoire de Recherche en Informatique","ror":"https://ror.org/04e3ktk27","country_code":"FR","type":"facility","lineage":["https://openalex.org/I102197404","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210144804","https://openalex.org/I4210159245"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I102197404","display_name":"Universit\u00e9 Paris-Sud","ror":"https://ror.org/028rypz17","country_code":"FR","type":"education","lineage":["https://openalex.org/I102197404"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Christine Paulin-Mohring","raw_affiliation_strings":["Laboratoire de Recherche en Informatique, UMR 8623 CNRS, Universit\u00e9 Paris-Sud, B\u00e2timent 490, F-91405, Orsay Cedex, France"],"affiliations":[{"raw_affiliation_string":"Laboratoire de Recherche en Informatique, UMR 8623 CNRS, Universit\u00e9 Paris-Sud, B\u00e2timent 490, F-91405, Orsay Cedex, France","institution_ids":["https://openalex.org/I4210144804","https://openalex.org/I102197404","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069964343"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.2436,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.8140625,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"302","last_page":"317"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8742916584014893},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6307435631752014},{"id":"https://openalex.org/keywords/intelligent-verification","display_name":"Intelligent verification","score":0.6198733448982239},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.6129359006881714},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.609172523021698},{"id":"https://openalex.org/keywords/verification","display_name":"Verification","score":0.559730052947998},{"id":"https://openalex.org/keywords/functional-verification","display_name":"Functional verification","score":0.5437584519386292},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5406811237335205},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5143543481826782},{"id":"https://openalex.org/keywords/high-level-verification","display_name":"High-level verification","score":0.5123471021652222},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.4825705587863922},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.46836885809898376},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4224425256252289},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.37722137570381165},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21672657132148743},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.14651653170585632},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.13980025053024292},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.08424776792526245},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.07209652662277222}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8742916584014893},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6307435631752014},{"id":"https://openalex.org/C3406870","wikidata":"https://www.wikidata.org/wiki/Q6044160","display_name":"Intelligent verification","level":5,"score":0.6198733448982239},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.6129359006881714},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.609172523021698},{"id":"https://openalex.org/C142284323","wikidata":"https://www.wikidata.org/wiki/Q7921323","display_name":"Verification","level":5,"score":0.559730052947998},{"id":"https://openalex.org/C62460635","wikidata":"https://www.wikidata.org/wiki/Q5508853","display_name":"Functional verification","level":3,"score":0.5437584519386292},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5406811237335205},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5143543481826782},{"id":"https://openalex.org/C187250869","wikidata":"https://www.wikidata.org/wiki/Q5754573","display_name":"High-level verification","level":5,"score":0.5123471021652222},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.4825705587863922},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.46836885809898376},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4224425256252289},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.37722137570381165},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21672657132148743},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.14651653170585632},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.13980025053024292},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.08424776792526245},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.07209652662277222}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/11526841_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11526841_21","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W204377626","https://openalex.org/W1486696980","https://openalex.org/W1488612566","https://openalex.org/W1501674746","https://openalex.org/W1525726734","https://openalex.org/W1526757679","https://openalex.org/W1557234332","https://openalex.org/W1573154295","https://openalex.org/W1592957105","https://openalex.org/W1853911989","https://openalex.org/W1869829327","https://openalex.org/W1887681675","https://openalex.org/W1998490923","https://openalex.org/W2090962365","https://openalex.org/W2100380323","https://openalex.org/W2110980218","https://openalex.org/W2120897738","https://openalex.org/W2141236940","https://openalex.org/W2618896829","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2361881307","https://openalex.org/W2929969821","https://openalex.org/W4205300843","https://openalex.org/W2392047570","https://openalex.org/W3120172095","https://openalex.org/W3155012083","https://openalex.org/W2363848262","https://openalex.org/W2354470518","https://openalex.org/W2059150015","https://openalex.org/W2035244079"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
