共 17 条
[5]
Bachmair L., 1994, Journal of Logic and Computation, V4, P217, DOI 10.1093/logcom/4.3.217
[6]
BACKES M, 2007, P 5 ACM WORKSH FORM, P101
[7]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[8]
Chien HY, 2000, IEICE T FUND ELECTR, VE83A, P2762
[9]
Feldman Paul., 1987, A Practical Scheme for Non-interactive Verifiable Secret Sharing Paul Feldman, P427
[10]
MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION
[J].
ELECTRONICS LETTERS,
1994, 30 (19)
:1591-1592