{"_id":"YN4rNpXEjWBym6arK","bibbaseid":"bistarelli-10scspsformodellingattackstosecurityprotocols-2004","downloads":0,"creationDate":"2018-10-01T12:30:36.342Z","title":"10. SCSPs for Modelling Attacks to Security Protocols","author_short":["Bistarelli, S."],"year":2004,"bibtype":"misc","biburl":null,"bibdata":{"title":"10. SCSPs for Modelling Attacks to Security Protocols","type":"misc","year":"2004","source":"Semirings for Soft Constraint Solving and Programming","identifiers":"[object Object]","id":"e09e2f0a-71a9-36a3-ba44-2d1e4966c776","created":"2017-04-06T23:05:12.297Z","file_attached":false,"profile_id":"903920d0-d2a6-30df-a1d5-ff042699cff4","last_modified":"2017-04-06T23:05:12.297Z","read":false,"starred":false,"authored":"true","confirmed":false,"hidden":false,"private_publication":false,"bibtype":"misc","author":"Bistarelli, Stefano","bibtex":"@misc{\n title = {10. SCSPs for Modelling Attacks to Security Protocols},\n type = {misc},\n year = {2004},\n source = {Semirings for Soft Constraint Solving and Programming},\n identifiers = {[object Object]},\n id = {e09e2f0a-71a9-36a3-ba44-2d1e4966c776},\n created = {2017-04-06T23:05:12.297Z},\n file_attached = {false},\n profile_id = {903920d0-d2a6-30df-a1d5-ff042699cff4},\n last_modified = {2017-04-06T23:05:12.297Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n private_publication = {false},\n bibtype = {misc},\n author = {Bistarelli, Stefano}\n}","author_short":["Bistarelli, S."],"bibbaseid":"bistarelli-10scspsformodellingattackstosecurityprotocols-2004","role":"author","urls":{},"downloads":0},"search_terms":["scsps","modelling","attacks","security","protocols","bistarelli"],"keywords":[],"authorIDs":[]}