Non-Malleability and Emulation Based Approach to Cryptographic Protocol Analysis: Non-Malleability and Emulation Based Approach to Cryptographic Protocol Analysis

[1]  Catherine A. Meadows,et al.  Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..

[2]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).