共 21 条
[1]
Abadi M., 1997, P 4 ACM C COMPUTER C, P36
[3]
Abadi Martin, 2001, P 28 ACM SIGPLAN SIG, P104, DOI DOI 10.1145/373243.360213
[5]
Baudet M., 2007, THESIS
[6]
Baudet Mathieu, 2005, P 12 ACM C COMP COMM, P16
[7]
Blanchet B, 2005, IEEE S LOG, P331
[8]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[10]
Borgstrom J, 2004, LECT NOTES COMPUT SC, V3170, P161