共 54 条
- [21] Clark J., 1997, SURVEY AUTHENTICATIO
- [22] Cremers C., 2014, SCYTHER TOOL COMPROM
- [23] Cremers C., 2013, DES CODES CRYPT
- [25] Cremers Cas J. F., 2010, International Journal of Applied Cryptography, V2, P83, DOI 10.1504/IJACT.2010.038304
- [26] Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
- [27] Cremers CJF, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P119
- [28] GUNTHER CG, 1990, LECT NOTES COMPUT SC, V434, P29
- [29] Gupta P., 2006, P JOINT WORKSH FDN C, P113
- [30] Gupta P., 2005, Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering, P23