共 27 条
[2]
[Anonymous], 2008, P 2008 ACM S INF COM
[3]
[Anonymous], 1996, LNCS
[4]
BELLARE M, 2008, J CRYPTOLOGY, V21
[5]
Bengtson J., 2008, MSRTR2008118
[6]
BHARGAVAN K, 2006, CSFW 06
[7]
Bhargavan K., 2006, LNCS, V4184
[8]
Bhargavan K, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P459
[9]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[10]
A computationally sound mechanized prover for security protocols
[J].
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2006,
:140-154