共 75 条
[23]
CAMPBELL JR, 2007, P 12 WORLD C HLTH ME, P2401
[24]
An NP decision procedure for protocol insecurity with XOR
[J].
18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS,
2003,
:261-270
[25]
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
[J].
18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS,
2003,
:271-280
[27]
del Cerro L. F., 1989, MACHINE LEARNING MET, P301
[29]
Dzik W, 2006, CONTRIB GEN ALGEBRA, V17, P73
[30]
FRIEDMAN H, 1975, J SYMBOLIC LOGIC, V40, P113, DOI 10.2307/2271891