共 33 条
- [1] Deciding knowledge in security protocols under (many more) equational theories [J]. 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 62 - 76
- [2] Abadi M, 2004, LECT NOTES COMPUT SC, V3142, P46
- [4] Abadi M., 1998, Nordic Journal of Computing, V5, P267
- [5] ABADI M, 2001, P 28 ACM S PRINC PRO, P104, DOI DOI 10.1145/373243.360213
- [6] [Anonymous], 1996, LNCS
- [7] Baudet M, 2005, LECT NOTES COMPUT SC, V3580, P652
- [8] Baudet M., 2005, PROC ACM C COMPUTER, P16
- [9] BAUDET M, 2005, COMMUNICATION
- [10] Blanchet B, 2005, IEEE S LOG, P331