共 25 条
[1]
Abadi Martin, 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P122, DOI 10.1109/RISP.1994.296587
[2]
[Anonymous], 1996, LNCS
[3]
BELLARE M, 1994, LECT NOTES COMPUTER, V773, P232
[4]
BIRD R, 1992, LECT NOTES COMPUT SC, V576, P44
[6]
Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
[7]
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[8]
Strand spaces: Why is a security protocol correct?
[J].
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1998,
:160-171
[9]
What do we mean by entity authentication?
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:46-54
[10]
Authenticity by typing for security protocols
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:145-159