{"id":"https://openalex.org/W2396854436","doi":"https://doi.org/10.1201/b13055-16","title":"Applying Timed Automata to Model Checking of Security Protocols","display_name":"Applying Timed Automata to Model Checking of Security Protocols","publication_year":2012,"publication_date":"2012-11-29","ids":{"openalex":"https://openalex.org/W2396854436","doi":"https://doi.org/10.1201/b13055-16","mag":"2396854436"},"language":"en","primary_location":{"id":"doi:10.1201/b13055-16","is_oa":false,"landing_page_url":"https://doi.org/10.1201/b13055-16","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Handbook of Finite State Based Models and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059853288","display_name":"Miros\u0142aw Kurkowski","orcid":"https://orcid.org/0000-0003-0900-3243"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Miros\u0142aw Kurkowski","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5040588151","display_name":"Wojciech Penczek","orcid":"https://orcid.org/0000-0001-6477-4863"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wojciech Penczek","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059853288"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.1898,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.87340714,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"235","last_page":"266"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11567","display_name":"semigroups and automata theory","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6935219764709473},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.648072361946106},{"id":"https://openalex.org/keywords/automaton","display_name":"Automaton","score":0.6072988510131836},{"id":"https://openalex.org/keywords/timed-automaton","display_name":"Timed automaton","score":0.4676762521266937},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3485901355743408}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6935219764709473},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.648072361946106},{"id":"https://openalex.org/C112505250","wikidata":"https://www.wikidata.org/wiki/Q787116","display_name":"Automaton","level":2,"score":0.6072988510131836},{"id":"https://openalex.org/C30788636","wikidata":"https://www.wikidata.org/wiki/Q7805517","display_name":"Timed automaton","level":3,"score":0.4676762521266937},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3485901355743408}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1201/b13055-16","is_oa":false,"landing_page_url":"https://doi.org/10.1201/b13055-16","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Handbook of Finite State Based Models and Applications","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5699999928474426,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2077025369"],"related_works":["https://openalex.org/W1750171350","https://openalex.org/W2095644384","https://openalex.org/W1571606103","https://openalex.org/W1903000972","https://openalex.org/W2148140319","https://openalex.org/W2035000455","https://openalex.org/W2569130014","https://openalex.org/W2121845202","https://openalex.org/W2746280673","https://openalex.org/W2560415449"],"abstract_inverted_index":{"Security":[0],"protocols":[1],"are":[2,32,78,99],"an":[3,36,44],"important":[4],"and":[5,54,102,107,126],"very":[6],"often":[7,33,80],"crucial":[8],"element":[9],"of":[10,24,38,47,49,65,85,96],"security":[11,48,143],"in":[12,20,105,113,131],"computer":[13,17],"systems.":[14],"In":[15],"open":[16],"networks,":[18],"especially":[19],"systems":[21,98],"realizing":[22],"goals":[23],"the":[25,142],"public":[26],"key":[27,74],"infrastructure,":[28],"these":[29],"concurrent":[30],"algorithms":[31],"used":[34,91],"during":[35],"exchange":[37],"information":[39],"for,":[40],"generally":[41],"speaking,":[42],"ensuring":[43],"adequate":[45],"level":[46,144],"data":[50],"transmitted":[51],"over":[52],"networks":[53],"electronic":[55],"transactions.":[56],"Their":[57],"principal":[58],"tasks":[59],"include,":[60],"among":[61],"others,":[62],"mutual":[63],"authentication":[64],"communicating":[66],"parties":[67],"(users,":[68],"servers)":[69],"or":[70,145],"a":[71,114,118],"new":[72],"session":[73],"distribution.":[75],"Basically,":[76],"they":[77],"most":[79],"applied":[81],"as":[82,89],"essential":[83],"components":[84],"large":[86],"systems,":[87],"such":[88,97],"widely":[90],"communication":[92],"protocols.":[93],"Important":[94],"examples":[95],"Kerberos,":[100],"SSL/TLS,":[101],"Zfone.":[103],"However":[104],"literature":[106],"applications,":[108],"one":[109],"can":[110,140],"find":[111,134],"errors":[112],"protocol":[115],"design.":[116],"Thisjustifies":[117],"vital":[119],"need":[120],"to":[121,124,127,133],"develop":[122],"methods":[123],"specify":[125],"verify":[128],"their":[129],"properties":[130],"order":[132],"faults":[135],"allowing":[136],"unwanted":[137],"behavior,":[138],"which":[139],"lower":[141],"even":[146],"discredit":[147],"it":[148],"completely.":[149]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
