共 18 条
[2]
ABADI M, 2002, 11 INT WORLD WID WEB
[3]
Bella G, 2003, LECT NOTES COMPUT SC, V2758, P352
[4]
Bella G, 1998, LECT NOTES COMPUT SC, V1485, P361, DOI 10.1007/BFb0055875
[5]
BELLA G, 1997, DIMACS WORKSH DESIGN
[6]
Bella S, 2002, 9 ACM C COMP COMM SE, P12
[7]
Blanchet B, 2003, LECT NOTES COMPUT SC, V2896, P188
[8]
Blanchet B, 2002, LECT NOTES COMPUT SC, V2477, P342
[9]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[10]
Types and effects for asymmetric cryptographic protocols
[J].
15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS,
2002,
:77-91