{"_id":{"_str":"53f475e53d9d602c1a00128e"},"__v":3,"authorIDs":["5457089d8b01c8193000012f","5a8SaRQZEqQauLeSj","5dec2eeed39dc7de01000059","5defa628706001de01000155","5df0bf368367c8de0100014e","5df7a6a2f3cb28df0100013e","5df8c7c4e6b510df0100018c","5df8e4de877972de0100016c","5df99361c4ada8de01000018","5dfea9342331dfdf01000059","5e012b722e225bde01000053","5e0968c8ade67ddf01000043","5e0b068b3830a1df010000e1","5e10a884cfb06ddf0100002c","5e10fd55d6a01ede01000024","5e142e4b12768ef30100003c","5e1961659eca7cdf01000080","5e1a2ca69fbdddde010000ff","5e1f814208195af3010000a8","5e2b62d96366e2df010000e6","5e2b8ef4f92538df01000011","5e2d73a3556d50df01000041","5e30e7755f9c1cf2010000d7","5e35f2395cd57fde010000c7","5e3a22e3c268d2de01000108","5e3b007c55f0f2df0100011a","5e3e128b4cdb49de0100008a","5e4094bbd668c6de0100007c","5e40f782fd6934df01000169","5e413b68b7d170df01000092","5e42e16aa6f4a6f2010000d1","5e4eddeb2962cadf010000e9","5e54f08fb8e445df01000107","6rZ7TmdCqfG4dxRdT","Q5h43gs9oNpAm4KeK","Zw3hLXQ8Xyab4HobY"],"author_short":["Bistarelli, S.","Cervesato, I.","Lenzini, G.","Martinelli, F."],"bibbaseid":"bistarelli-cervesato-lenzini-martinelli-relatingprocessalgebrasandmultisetrewritingforimmediatedecryptionprotocols-2003","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Stefano"],"propositions":[],"lastnames":["Bistarelli"],"suffixes":[]},{"firstnames":["Iliano"],"propositions":[],"lastnames":["Cervesato"],"suffixes":[]},{"firstnames":["Gabriele"],"propositions":[],"lastnames":["Lenzini"],"suffixes":[]},{"firstnames":["Fabio"],"propositions":[],"lastnames":["Martinelli"],"suffixes":[]}],"editor":[{"firstnames":["Vladimir"],"propositions":[],"lastnames":["Gorodetsky"],"suffixes":[]},{"firstnames":["Leonard","J."],"propositions":[],"lastnames":["Popyack"],"suffixes":[]},{"firstnames":["Victor","A."],"propositions":[],"lastnames":["Skormin"],"suffixes":[]}],"title":"Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols","booktitle":"Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings","series":"Lecture Notes in Computer Science","volume":"2776","pages":"86–99","publisher":"Springer","year":"2003","url":"https://doi.org/10.1007/978-3-540-45215-7\\_7","doi":"10.1007/978-3-540-45215-7_7","timestamp":"Tue, 14 May 2019 10:00:41 +0200","biburl":"https://dblp.org/rec/conf/mmmacns/BistarelliCLM03.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/mmmacns/BistarelliCLM03,\n author = {Stefano Bistarelli and\n Iliano Cervesato and\n Gabriele Lenzini and\n Fabio Martinelli},\n editor = {Vladimir Gorodetsky and\n Leonard J. Popyack and\n Victor A. Skormin},\n title = {Relating Process Algebras and Multiset Rewriting for Immediate Decryption\n Protocols},\n booktitle = {Computer Network Security, Second International Workshop on Mathematical\n Methods, Models, and Architectures for Computer Network Security,\n {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {2776},\n pages = {86--99},\n publisher = {Springer},\n year = {2003},\n url = {https://doi.org/10.1007/978-3-540-45215-7\\_7},\n doi = {10.1007/978-3-540-45215-7\\_7},\n timestamp = {Tue, 14 May 2019 10:00:41 +0200},\n biburl = {https://dblp.org/rec/conf/mmmacns/BistarelliCLM03.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bistarelli, S.","Cervesato, I.","Lenzini, G.","Martinelli, F."],"editor_short":["Gorodetsky, V.","Popyack, L. J.","Skormin, V. A."],"key":"DBLP:conf/mmmacns/BistarelliCLM03","id":"DBLP:conf/mmmacns/BistarelliCLM03","bibbaseid":"bistarelli-cervesato-lenzini-martinelli-relatingprocessalgebrasandmultisetrewritingforimmediatedecryptionprotocols-2003","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-540-45215-7\\_7"},"metadata":{"authorlinks":{"bistarelli, s":"https://bista.sites.dmi.unipg.it/papers/"}},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/53/6380.bib","creationDate":"2014-08-20T10:18:13.687Z","downloads":0,"keywords":[],"search_terms":["relating","process","algebras","multiset","rewriting","immediate","decryption","protocols","bistarelli","cervesato","lenzini","martinelli"],"title":"Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols","year":2003,"dataSources":["GhB5rb8JzW6az3exo","T6HLi2LBH4teAezac","LXyJ7X9n6g55d9qgh","DjivyTGGA5qit7Mf4","NMm7YpyiDxjcnpopo","WXL4P7BKHQy7Qss6y"]}