共 46 条
- [2] Abadi M, 2003, LECT NOTES COMPUT SC, V2896, P72
- [4] Abadi M., 1998, Nordic Journal of Computing, V5, P267
- [6] ABADI M, 2001, 28 ANN ACM SIGPLAN S, V104
- [9] Aiello W., 2004, ACM Transactions on Information and Systems Security, V7, P242, DOI 10.1145/996943.996946
- [10] Reconstruction of attacks against cryptographic protocols [J]. 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 140 - 154