[{"data": {"name": "Deciding security properties for cryptographic protocols. application to key cycles", "@type": "ScholarlyArticle", "genre": "journal-article", "author": [{"name": "Hubert Comon-Lundh", "@type": "Person"}, {"name": "V\u00e9ronique Cortier", "@type": "Person"}, {"name": "Eugen Z\u0103linescu", "@type": "Person"}], "@context": "http://schema.org/", "encoding": [{"@type": "MediaObject", "contentUrl": "http://arxiv.org/pdf/0708.3564", "encodingFormat": "application/pdf"}], "publisher": {"name": "Association for Computing Machinery (ACM)", "@type": "Organization"}, "identifier": [{"@type": "PropertyValue", "value": "10.1145/1656242.1656244", "propertyID": "DOI"}, {"@type": "PropertyValue", "value": "CCDcNTQo1xY4W-CTiZoCTHcaRRF-CDhDM2ZvhXNQr-CRKySjLMNsiYo", "propertyID": "ISCC"}], "datePublished": "2010-01-01"}, "schema": "schema.org", "mediatype": "application/ld+json"}]