共 27 条
[11]
Blanchet B, 2004, P IEEE S SECUR PRIV, P86
[12]
Blanchet B, 2002, LECT NOTES COMPUT SC, V2477, P342
[13]
Blanchet B, 2003, LECT NOTES COMPUT SC, V2620, P136
[14]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[15]
Capturing parallel attacks within the data independence framework
[J].
15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS,
2002,
:147-159
[16]
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[17]
TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS
[J].
COMMUNICATIONS OF THE ACM,
1981, 24 (08)
:533-536
[18]
Durgin N., 2004, Journal of Computer Security, V12, P247
[19]
Types and effects for asymmetric cryptographic protocols
[J].
15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS,
2002,
:77-91
[20]
GOUBAULTLARRECQ J, 2004, ACT 15 JOURN FRANC L