共 49 条
[1]
[Anonymous], 1997, INFORM SECURITY
[2]
SATMC: A SAT-based model checker for security protocols
[J].
LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS,
2004, 3229
:730-733
[3]
Aumann Y., P INT C THEOR COMP S, P20
[4]
Basin D, 2003, LECT NOTES COMPUT SC, V2808, P253
[5]
Boichut Y., P AVIS 04 3 INT WORK
[6]
Chan W., P INT C SEC MAN JUN
[7]
Chevalier Y., 2002, CAV '02: Proceedings of the 14th International Conference on Computer Aided Verification, P324, DOI DOI 10.1007/3-540-45657-0_24
[8]
Deniable authentication protocols
[J].
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES,
2001, 148 (02)
:101-104
[10]
Dwork C., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P409, DOI 10.1145/276698.276853