1International Organization for Standardization. ISO/ IEC 2nd DIS 11770--3 Key Management, Part 3: Mechanisms Using Asymmetric Techniques[S]. Geneva, Switzerland:[s. n.], 1997. 被引量:1
2Horng G, Hsu C K. Weakness in the Helsinki protocol[J].Electronics Letters, 1998, 34(4):354-355. 被引量:1
3Mitchell C, Yeun C Y. Fixing a problem in the Helsinki protocol[J]. ACM Operating Systems Review, 1998, 32(4): 21-24. 被引量:1
4Datta A, Derek A, Mitchell J C, et al. A derivation system for security protocols and its logical formalization[C]//16th IEEE Computer Security Foundations Workshop. Pacific Grove: IEEE, 2003:109-125. 被引量:1
5Datta A, Derek A, Mitchell J C, et al. Abstraction and refinement in protocol derivation[C]//17th IEEE Computer Security Foundations Workshop. Pacific Grove: IEEE, 2004: 30-45. 被引量:1
6Datta A, Derek A, Mitchell J C, et al. Protocol com position logic (PCL) [J]. Electronic Notes in Theo retical Computer Science (ENTCS), 2007, 172: 311- 358. 被引量:1
7Roy A, Datta A, Derek A, et al. Secrecy analysis in protocol composition logic [C]// Formal Logical Methods for System Security and Correctness. Washington: IOS Press, 2008. 被引量:1
8Derek A. Formal analysis of security protocols: protocol composition logic[D]. Stanford:Computer Science Department, Stanford University, 2006. 被引量:1
9Durgin N, Mitchell J C, Pavlovic D. A compositional logic for proving security properties of protocols [J]. Journal of Computer Security, 2003, 11 (4): 677-721. 被引量:1