共 8 条
[1]
Towards a completeness result for model checking of security protocols[J] . Gavin Lowe.Journal of Computer Security . 1999 (2‐3)
[4]
EFFICIENT AND TIMELY MUTUAL AUTHENTICATION.
[J].
Operating Systems Review (ACM),
1987, 21 (01)
:8-10
[6]
Modern Cryptography: Theory and Practice .2 Mao W B. . 2004
[7]
Protocol independence through disjoint encryption .2 Guttman J D,Thayer F J. Proceedings of 13th Computer Security Foundations Workshop . 2000
[8]
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels .2 Canetti R,Krawczyk H. Proceedings of the Advances in Cryptology-EUROCRYPT2001 . 2001