共 47 条
[34]
Gray J. W. III, 1995, Proceedings. The Eighth IEEE Computer Security Foundations Workshop (Cat. No.95TB8076), P108, DOI 10.1109/CSFW.1995.518557
[35]
Provable security for cryptographic protocols - Exact analysis and engineering applications
[J].
10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
1997,
:45-58
[36]
KEMMERER R, 1994, J CRYPTOL, V7, P79, DOI 10.1007/BF00197942
[38]
LINCOLN P, 1998, P 5 ACM C COMP COMM, P112
[39]
I/O automaton models and proofs for shared-key communication systems
[J].
PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP,
1999,
:14-29
[40]
Meadows C., 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.91CH2986-8), P182, DOI 10.1109/RISP.1991.130786