共 15 条
[1]
Activities P., CAS CREMERS
[2]
[Anonymous], J NETWORK SECURITY
[3]
Asvial Muhammad, 2014, 2014 IEEE Symposium on Wireless Technology and Applications (ISWTA), P36, DOI 10.1109/ISWTA.2014.6981191
[4]
Budiyanto S., 2017, NEW MODEL GENETIC ZO, V15, P598
[6]
Colin B., 2003, INFORM SECURITY CRYP
[7]
Cremers C.J. F., 2006, Scyther: Unbounded Verification of Security Protocols, P1
[8]
Dalai Nitish, 2010, International Journal of Communications, Networks and System Sciences, V3, P779, DOI 10.4236/ijcns.2010.310104
[10]
Mao W., 1995, P 4 IMA C CRYPT COD