The survivability of survivability
暂无分享,去创建一个
[1] Martín Abadi,et al. Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Joshua D. Guttman,et al. Strand spaces: why is a security protocol correct? , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[3] J. Jacob,et al. Basic Theorems About Security , 1992, J. Comput. Secur..
[4] Peter Y. A. Ryan,et al. Mathematical Models of Computer Security , 2000, FOSAD.
[5] A. W. Roscoe,et al. Automating Data Independence , 2000, ESORICS.
[6] Michael Goldsmith,et al. Modelling and analysis of security protocols , 2001 .