共 17 条
[11]
Basin D., Cremers C., Know your enemy: Compromising adversaries in protocol analysis, ACM Transactions on Information and System Security, 17, 2, pp. 1-31, (2014)
[12]
Avalle M., Pironti A., Sisto R., Formal verification of security protocol implementations: A survey, Formal Aspects of Computing, 26, 1, pp. 99-123, (2014)
[13]
Kremer S., Kunnemann R., Automated analysis of security protocols with global state, Proc. of the IEEE Symposium on Security and Privacy, pp. 163-178, (2014)
[14]
Wang E.J., An novel BAN-liked logic for security protocol analysis and its automatic implementation, (2011)
[15]
Saul E., Hutchison A., Enhanced security protocol engineering through a unified multidimensional framework, IEEE Journal on Selected Areas in Communications, 21, 1, pp. 62-76, (2003)
[16]
Dong L., Chen K.F., Cryptographic protocol: Security analysis based on trusted freshness, pp. 341-343, (2012)
[17]
Backes M., Cervesato I., Jaggard A.D., Et al., Cryptographically sound security proofs for basic and public-key kerberos, International Journal of Information Security, 10, 2, pp. 107-134, (2011)