共 8 条
- [3] 密码学与计算机网络安全[M]. - 清华大学出版社 , 卿斯汉著, 2001
- [4] Towards a Strand Semantics for Authentication Logic[J] . Paul Syverson.Electronic Notes in Theoretical Computer Science . 2000
- [5] Strand spaces: proving security protocols correct[J] . F. Javier Thayer Fábrega,Jonathan C. Herzog,Joshua D. Guttman.Journal of Computer Security . 1999 (2‐3)
- [6] A critique of the Burrows, Abadi and Needham logic[J] . Dan M. Nessett.ACM SIGOPS Operating Systems Review . 1990 (2)
- [8] Some new attacks upon authentication protocols .2 WangGL,QingSH,ZhouZF. Journal ofSoftware . 2001