共 37 条
[5]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[6]
Cheon JH, 2007, LECT NOTES COMPUT SC, V4450, P442
[7]
Feasibility of multi-protocol attacks
[J].
FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS,
2006,
:287-294
[8]
Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
[9]
Cremers CasJ.F., 2006, Generalizing Needham-Schroeder-Lowe for multi-party authentication