共 42 条
[4]
ABADI M, 2001, P 28 ACM S PRINC PRO, P104, DOI DOI 10.1145/373243.360213
[5]
Reconstruction of attacks against cryptographic protocols
[J].
18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2005,
:140-154
[6]
[Anonymous], 2005, STORAGESS 05
[7]
[Anonymous], 1996, LNCS
[8]
[Anonymous], 2003, NDSS
[9]
Causality-based abstraction of multiplicity in security protocols
[J].
20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS,
2007,
:355-+
[10]
Backes M, 2006, LECT NOTES COMPUT SC, V4189, P327