{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q2018750","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q2018750","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q2018750","kernelVersion":"v1","immutable":true,"modified":"2026-01-21T05:24:15Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q2018750","name":"Safe abstractions of data encodings in formal security protocol models","headline":"Safe abstractions of data encodings in formal security protocol models","description":"scientific article; zbMATH DE number 6419441","url":"https://portal.mardi4nfdi.de/entity/Q2018750","datePublished":"2015-03-25","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q540180"},{"@id":"https://portal.mardi4nfdi.de/entity/Q931440"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q164203"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1007/S00165-012-0267-Y","url":"https://doi.org/10.1007/S00165-012-0267-Y"},"sameAs":["https://doi.org/10.1007/S00165-012-0267-Y"],"citation":[{"@id":"https://portal.mardi4nfdi.de/entity/Q3546279"},{"@id":"https://portal.mardi4nfdi.de/entity/Q5178877"},{"@id":"https://portal.mardi4nfdi.de/entity/Q555790"},{"@id":"https://portal.mardi4nfdi.de/entity/Q5447364"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3968876"},{"@id":"https://portal.mardi4nfdi.de/entity/Q5394799"},{"@id":"https://portal.mardi4nfdi.de/entity/Q5711502"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3777424"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2852371"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2269718"}]},"provenance":{"prov:generatedAtTime":"2026-01-21T05:24:15Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}