共 38 条
- [1] Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
- [2] Anderson R., 1998, Security Protocols. 5th International Workshop Proceedings, P125, DOI 10.1007/BFb0028165
- [3] Anderson R., 2001, SECURITY ENG
- [4] [Anonymous], P 1997 S CRYPT INF S
- [5] Bao F., 1997, LNCS, P115
- [6] Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
- [7] Biehl I, 2000, LECT NOTES COMPUT SC, V1880, P131
- [8] Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
- [9] BLOMER J, 2002, COMMUNICATION APR