共 17 条
[1]
Andres M., 2011, THESIS RADBOUD U NIJ
[3]
[Anonymous], ACM Transactions on Information and System Security (TISSEC), DOI DOI 10.1145/290163.290168
[4]
Bhargava M, 2005, LECT NOTES COMPUT SC, V3653, P171, DOI 10.1007/11539452_16
[5]
Bianco A., 1995, Foundations of Software Technology and Theoretical Computer Science. 15th Conference. Proceedings, P499
[6]
Cahn G, 2010, LECT NOTES COMPUT SC, V6349, P193
[7]
Analyzing security protocols using time-bounded Task-PIOAs
[J].
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS,
2008, 18 (01)
:111-159
[9]
Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326