共 29 条
[2]
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[3]
BASIN D, 2003, P 10 ACM C COMP COMM, P335
[4]
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[5]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96