共 3 条
[2]
Strand spaces: proving security protocols correct[J] . F. Javier Thayer Fábrega,Jonathan C. Herzog,Joshua D. Guttman.Journal of Computer Security . 1999 (2‐3)
[3]
The inductive approach to verifying cryptographic protocols[J] . Lawrence C. Paulson.Journal of Computer Security . 1998 (1,2)