共 46 条
[2]
Abadi M, 2003, LECT NOTES COMPUT SC, V2896, P72
[4]
Abadi M., 1998, Nordic Journal of Computing, V5, P267
[6]
ABADI M, 2001, 28 ANN ACM SIGPLAN S, V104
[9]
Aiello W., 2004, ACM Transactions on Information and Systems Security, V7, P242, DOI 10.1145/996943.996946
[10]
Reconstruction of attacks against cryptographic protocols
[J].
18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2005,
:140-154