共 16 条
[1]
[Anonymous], 2006, ARTIST2 WORKSH SEC S
[2]
[Anonymous], 2001, RFC3161
[3]
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[4]
AVISPA, 2017, AVISPA AUTOMATED VAL
[5]
Basin David A., 2005, International Journal of Information Security, V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
[6]
A LOGIC OF AUTHENTICATION
[J].
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES,
1989, 426 (1871)
:233-271
[7]
Cosic Jasmin, 2010, 2010 33rd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), P1226
[9]
Hosmer C., 2002, IJDE, V1, P1
[10]
Koen R., 2008, ISSA, P1