共 8 条
- [1] A LOGIC OF AUTHENTICATION [J]. PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871): : 233 - 271
- [2] Logic for verifying public-key cryptographic protocols [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32
- [3] Dojen R., 2005, ACM Transactions on Information and Systems Security, V8, P287, DOI 10.1145/1085126.1085128
- [4] ELTON S, 2001, FACILITATING MODELLI
- [5] Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854
- [6] LEI XF, 2007, 2 INT C COMP SCI ED, P853
- [7] A Logic to Model Time in Cryptographic Protocols [J]. ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 399 - 403
- [8] WANG YY, 2001, MODERN LOGIC COMPUTE