A Directed Graph-Based Authentication Protocol Model and Its Security Analysis
暂无分享,去创建一个
[1] Joshua D. Guttman,et al. Strand Spaces: Proving Security Protocols Correct , 1999, J. Comput. Secur..
[2] Wenbo Mao,et al. An augmentation of BAN-like logics , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[3] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[4] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[5] Catherine A. Meadows,et al. Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..