共 44 条
- [1] Abadi M.(1999)A calculus for cryptographic protocols: the Spi calculus Inform. Comput. 148 1-70
- [2] Gordon A.(2003)On the symbolic reduction of processes with cryptographic functions Theor. Comput. Sci. 290 695-740
- [3] Amadio R.(2001)Static analysis for the π-calculus with applications to security Inform. Comput. 168 68-92
- [4] Lugiez D.(2005)A method for symbolic analysis of security protocols Theor. Comput. Sci. 338 393-425
- [5] Vanackère V.(1996)A Symbolic Semantics for the π-calculus Inform. Comput. 126 34-52
- [6] Bodei C.(1990)A logic of authentication ACM Trans. Comput. Syst. 8 18-36
- [7] Degano P.(1994)Model checking and abstraction ACM Trans. Programm. Languages Syst. 16 1512-1542
- [8] Nielson F.(1983)On the security of public key protocols IEEE Trans. Inform. Theory. 29 198-208
- [9] Nielson H.(1999)Strand spaces: Proving security protocols correct J. Comput. Secur. 7 181-230
- [10] Boreale M.(1997)The Compositional Security Checker: A tool for the verification of information flow security properties IEEE Comput. Soc. 23 550-571