共 36 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[3]
A Lightweight and Secure Anonymity Preserving Protocol for WBAN
[J].
IEEE ACCESS,
2020, 8
:178183-178194
[6]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[7]
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[8]
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[10]
Dolev D., 1981, 22nd Annual Symposium on Foundations of Computer Science, P350, DOI 10.1109/SFCS.1981.32