共 28 条
[11]
Goktas E., 2014, MITLCSTR676, P575
[12]
Gray J. W. III, 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.91CH2986-8), P21, DOI 10.1109/RISP.1991.130769
[13]
Kantorovich L., 1942, MANAGE SCI, V5, P1
[14]
Kopf B, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P286
[15]
Malacaria P, 2007, CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES, P225
[16]
Massey JL., 1990, P IEEE INT S INF THE
[17]
McLean J., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P180, DOI 10.1109/RISP.1990.63849
[18]
Millen J. K., 1990, Proceedings. The Computer Security Foundations Workshop III (Cat. No.TH0315-2), P84, DOI 10.1109/CSFW.1990.128188
[19]
Poundstone W., 1992, PRISONERS DILEMMA
[20]
Skyrms B., 2003, STAG HUNT EVOLUTION