共 33 条
[1]
[Anonymous], LNCS
[2]
[Anonymous], 1996, LNCS
[3]
Baader F., 2001, HandBook of Automated Reasoning, V2, P445, DOI DOI 10.1016/B978-044450813-3/50010-2
[4]
BASIN D, 2001, INT J INF SECUR, V4, P181
[6]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[7]
Chevalier Y, 2003, LECT NOTES COMPUT SC, V2914, P124
[8]
CHEVALIER Y, 2003, 18 ANN IEEE S LOG CO
[10]
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
[J].
18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS,
2003,
:271-280