共 7 条
[1]
An efficient cryptographic protocol verifier based on logic programming. Blanchet B. In: Proceedings of the 14th Computer Security Foundation Workshop, Cape Breton, Nova Scotia, Canada . 2001
[2]
On the security of public key protocols. Dolev D,Yao A. IEEE Transactions on Information Theory . 1983
[3]
A hierarchy of authentication specifications. Lowe G. In: Proceedings of the 10th Computer Security Foundation Workshop,Massachusetts, USA . 1997
[4]
Analyzingsecurityprotocolswithsecrecytypesandlogicprograms. AbadiM,BlanchetB. Proceedingsofthe29thACMSym posiumonPrinciplesofProgramingLanguages (POPL’’02) . 2002
[5]
Acalculusforcryptographicprotocols:Thespicalculus. AbadiM,GordonA .D. InformationandComputatiuon . 1999
[6]
Fastandpreciseregularapproxima tionsoflogicpograms. GallagherJ,deWaalD .A. Proceedingsofthe11thInternationalConferenceonLogicProgramming . 1994
[7]
From secrecy to authenticity in security protocols. Blanchet B. In:Proceedings of the 9th International Static Analysis Symposium,Madrid . 2002