共 71 条
[1]
Abadi M, 2004, LECT NOTES COMPUT SC, V2986, P340
[2]
Reconstruction of attacks against cryptographic protocols
[J].
18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2005,
:140-154
[3]
[Anonymous], 1997, 97983 ISOIEC
[4]
[Anonymous], 2005, AVISPA V1 0 USER MAN
[5]
Automatic compilation of protocol insecurity problems into logic programming
[J].
LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS,
2004, 3229
:617-627
[6]
Armando A, 2002, LECT NOTES COMPUT SC, V2529, P210
[7]
Armando A., 2002, Computer Aided Verification. 14th International Conference, CAV 2002. Proceedings (Lecture Notes in Computer Science Vol.2404), P349
[8]
Armando A, 2003, LECT NOTES COMPUT SC, V2805, P875
[9]
Armando A., 2003, LNCS, V2919, P257