共 14 条
[1]
[Anonymous], 1996, LNCS
[2]
BOREALE M, 2002, P 2002 ACM S APPL CO, P281
[4]
COMON H, 2002, J TELECOMMUNICATIONS, V4, P5
[6]
DURGIN N, 1999, EL P WORKSH FORM MET
[7]
Algebra model and security analysis for cryptographic protocols
[J].
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES,
2004, 47 (02)
:199-220
[8]
HUIMA A, 1999, P FLOC WORKSH FORM M
[9]
MEADOWS C, 1994, P 1994 COMP SEC FDN
[10]
MILLEN JK, 1995, P IEEE S SECUR PRIV, P251, DOI 10.1109/SECPRI.1995.398937