共 21 条
- [1] *3G TSPP, 33102 3G TSPP
- [3] BOYD C, 1998, P 1998 INT C INF SEC
- [4] BURROWS M, 1989, ACM OPERATING SYSTEM, V23, P1, DOI DOI 10.1145/74851.74852
- [5] Carlsen U., 1994, Operating Systems Review, V28, P16, DOI 10.1145/182110.182112
- [6] Logic for verifying public-key cryptographic protocols [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32
- [7] NEW DIRECTIONS IN CRYPTOGRAPHY [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
- [8] Gligor V. D., 1991, Proceedings. The Computer Security Foundations Workshop IV (Cat. No.91TH0383-0), P219, DOI 10.1109/CSFW.1991.151591
- [9] Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854
- [10] GONG L, 1991, P 4 IEEE COMP SEC FD, P99