共 7 条
[1]
Burrows M.(1989)A Logic of Authentication Proceedings of the Royal Society A426 233-271
[2]
Abadi M.(1983)On the Security of Public-Key Protocols IEEE Transactions on Information Theory 29 198-208
[3]
Needham R.(1976)New Directions in Cryptography IEEE Transactions on Information Theory IT-22 644-654
[4]
Dolev D.(undefined)undefined undefined undefined undefined-undefined
[5]
Yao A.(undefined)undefined undefined undefined undefined-undefined
[6]
Diffe W.(undefined)undefined undefined undefined undefined-undefined
[7]
Hellman M.E.(undefined)undefined undefined undefined undefined-undefined