共 46 条
- [2] Mobile values, new names, and secure communication [J]. ACM SIGPLAN NOTICES, 2001, 36 (03) : 104 - 115
- [4] Automated verification of remote electronic voting protocols in the applied pi-calculus [J]. CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, : 195 - 209
- [5] Baskar A., 2007, TARK 2007, P62, DOI [10.1145/1324249.1324261, DOI 10.1145/1324249.1324261]
- [6] Baudet Mathieu, 2005, P 12 ACM C COMP COMM, P16
- [7] Benaloh J., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P544, DOI 10.1145/195058.195407
- [8] Benaloh J., 1987, THESIS
- [9] An efficient cryptographic protocol verifier based on prolog rules [J]. 14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 82 - 96
- [10] Automated verification of selected equivalences for security protocols [J]. JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2008, 75 (01): : 3 - 51