Author:
Wang Huanbao,Zhang Yousheng,Li Yuan
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. Proceedings of the Royal Society, Series A 426(1871), 233–271 (1989), Also appeared as SRC Research Report 39 and, in a shortened form. ACM Transactions on Computer Systems 8(1), 18–36 (1990)
2. Kindred, D.: Theory Generation for Security Protocols [Ph.D. Thesis]. Pittsburgh: Department of Computer Science, Carnegie Mellon University (1999)
3. Lecture Notes in Computer Science;G. Lowe,1996
4. Millen, J.: The Interrogator Model. In: Proceedings of the 1995 IEEE Symposium on Security and Privacy, pp. 251–260. IEEE Computer Society Press, Los Alamitos (1995)
5. Meadows, C.: The NRL Protocol Analyzer: An Overview. Journal of Logic Programming 26(2), 113–131 (1996)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An inductive approach to strand spaces;Formal Aspects of Computing;2013-07
2. STGRs over Topological Spaces for Value-Passing Processes;Informatics in Control, Automation and Robotics;2011