共 20 条
[1]
Abadi M, 2004, LECT NOTES COMPUT SC, V3142, P46
[4]
ABADI M, 2001, P 28 ACM S PRINC PRO, P104, DOI DOI 10.1145/373243.360213
[5]
[Anonymous], 1996, LNCS
[6]
BAUDET M, 2005, COMMUNICATION
[7]
An NP decision procedure for protocol insecurity with XOR
[J].
18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS,
2003,
:261-270
[8]
Comon-Lundh H, 2004, LECT NOTES COMPUT SC, V2987, P1
[9]
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
[J].
18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS,
2003,
:271-280
[10]
COMONLUNDH H, 2003, LSV038 ENS CACH