共 24 条
[2]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[3]
BRYANT RE, 1986, IEEE T COMPUT, V35, P677, DOI 10.1109/TC.1986.1676819
[4]
Cook S. A., 1971, Proceedings of the 3rd annual ACM symposium on theory of computing, P151
[7]
DECHTER R, 1994, MOR KAUF R, P134
[9]
Hoos H., 2000, SAT, P283
[10]
Jackson D., 2000, Software Engineering Notes, V25, P14, DOI 10.1145/347636.383378