[1] |
范红, 冯登国 . 安全协议理论与方法[M]. 北京: 科学出版社, 2003. FAN H , FENG D G . Theories and Methods for Security Protocols[M]. Beijing: Science PressPress, 2003.
|
[2] |
卿斯汉 . 安全协议20年研究进展[J]. 软件学报, 2003,14(10): 1740-1752. QING S H . Twenty years development of security protocols research[J]. Journal of Software, 2003,14(10): 1740-1752.
|
[3] |
李建华, 张爱新, 薛质 ,等. 网络安全协议的形式化分析与验证[M]. 北京:机械工业出版社. 2010. LI J H , ZHANG A X , XUE Z ,et al. Formal Analysis and Verification of Network Security Protocols[M]. Beijing:China Machine Press. 2010.
|
[4] |
OTWAY D , REES O . Efficient and timely mutual authentication[J]. Operating Systems Review, 1987,21(1): 8-10.
|
[5] |
DATTA A . Security Analysis of Network Protocol:Compositional Reasoning and Complexity Theoretic Foundations[D]. Computer Science Department,Stanford University,September 2005. 8-72.
|
[6] |
DATTA A , DEREK A , MITCHELL J ,et al. Secure protocol composition[A]. Proceedings of the 2003 ACM workshop on Formal methods in security engineering[C]. 2003. 11-23.
|
[7] |
DURGIN N , MITCHELL J , PAVLOVIC D . A compositional logic for proving security properties of protocols[J]. Journal of Computer Security, 2003,11(4): 677-721.
|
[8] |
ROY A , DATTA A , DEREK A ,et al. Secrecy analysis in protocol composition logic[A]. Advances in Computer Science-ASIAN.2006.Secure Software and Related Issues[C]. 2006. 197-213.
|
[9] |
DATTA A , ROY A , MITCHELL J C ,et al. Protocol composition logic(PCL)[J]. Electronic Notes in Theoretical Computer Science, 2007,172(1): 311-358.
|
[10] |
BURROWS M , ABADI M , NEEDHAM R . A logic of authentication[J]. ACM Transactions on Computer Systems, 1990,8(1): 18-36.
|