共 12 条
- [1] Abadi M., 1991, Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, P201, DOI 10.1145/112600.112618
- [2] [Anonymous], 1996, MITLCSTR684
- [3] A LOGIC OF AUTHENTICATION [J]. PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871): : 233 - 271
- [4] CLARE D, 2007, ELECT NOTES THEORETI, V186, P27
- [5] Logic for verifying public-key cryptographic protocols [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32
- [6] Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854
- [7] KIM K, 2000, 2000 IEEE INT C COMM, V3, P1743
- [8] MICHIHARU K, 1999, 2 INT C INF COMM SEC, P183
- [9] PETER T, 2006, J UNIVERS COMPUT SCI, V12, P1373
- [10] Syverson P. F., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P14, DOI 10.1109/RISP.1994.296595