1. Dolev D, Yao A. On the security of public key protocols. IEEE Transactions on Information Theory, 1983, 29(2): 198-208
2. Burrows M, Abradi M, Needham R. A Logic of authentication. Proceedings of the Royal Society: Series A, 1989, 426: 233-271
3. Thayer Fabrega F J, Herzog J C, Guttman J D. Strand space: why is a security protocol correct? Proceedings of 1998 IEEE Symposium on Security and Privacy, May 3-6, 1998, Oakland, CA, USA: IEEE Computer Society, 1998: 160-171
4. Thayer Fabrega F J, Herzog J C, Guttman J D. Strand spaces. Technical Report. The MITRE Corporation, 1997
5. Thayer J, Herzog J, Guttman J. Honest ideals on strand spaces. Proceedings of the 11th IEEE Computer Security Foundations Workshop, Jun 9-11, 1998, Rockport, MA, USA. Los Alamitos, CA, USA: IEEE Computer Society,1998: 66-77
6. Thayer F J, Herzog J C, Guttman J D. Mixed strand spaces. Proceedings of the 12th IEEE Computer Security Foundations Workshop, Jun 28-30, Mordano, Italy. Los Alamitos, CA, USA: IEEE Computer Society, 1999: 72-82
7. Qin S H. Security protocol. Beijing, China: Tsinghua University Press, 2005: 78-149, 306-334 (in Chinese)
8. Wang G L, Qin S H, Zhou Z F. Some new attacks upon authentication protocols. Journal of Software, 2001, 12(6): 907-913 (in Chinese)
9. Zuo X L, Li W J, Liu Y C. Discrete mathematics. Shanghai, China: Shanghai Science and Technology Literature Press, 1982: 81-139 (in Chinese)
10. Zhou L X. Summarization of electronic commerce protocols research. Journal of Software, 2001, 12(7): 1015-1032 (in Chinese) |