共 46 条
[3]
ANLAUFF M, 2006, P FCS ARSPA 2006
[4]
[Anonymous], ENCRYPTION CHECKSUM
[5]
[Anonymous], 1996, LNCS
[6]
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[7]
Backes M, 2006, LECT NOTES COMPUT SC, V4189, P362
[8]
Backes M., 2003, P 10 ACM C COMP COMM, P220, DOI DOI 10.1145/948109.948140
[9]
Blanchet B, 2002, LECT NOTES COMPUT SC, V2477, P342
[10]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96