共 12 条
[1]
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[2]
A LOGIC OF AUTHENTICATION
[J].
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES,
1989, 426 (1871)
:233-271
[3]
Deng Y., 2006, CHAOHU COLL J, V78, P36
[4]
DENG YJ, 2006, CHAOHU COLL J, V78, P34
[5]
Meadows C., 2003, IEEE J SELECTED AREA, V21
[7]
QING SH, 2005, SECURITY PROTOCOL
[8]
Wang Yadi, 2006, CRYPTOGRAPHIC PROTOC
[9]
[杨世平 YANG Shiping], 2006, [计算机工程, Computer Engineering], V32, P126
[10]
Yang Shiping, 2006, COMPUTER ENG, V32, P130