共 8 条
[3]
密码学与计算机网络安全[M]. - 清华大学出版社 , 卿斯汉著, 2001
[4]
Towards a Strand Semantics for Authentication Logic[J] . Paul Syverson.Electronic Notes in Theoretical Computer Science . 2000
[5]
Strand spaces: proving security protocols correct[J] . F. Javier Thayer Fábrega,Jonathan C. Herzog,Joshua D. Guttman.Journal of Computer Security . 1999 (2‐3)
[6]
A critique of the Burrows, Abadi and Needham logic[J] . Dan M. Nessett.ACM SIGOPS Operating Systems Review . 1990 (2)
[8]
Some new attacks upon authentication protocols .2 WangGL,QingSH,ZhouZF. Journal ofSoftware . 2001