[ 1 ] J Heather, G Lowe, S Schneider.How to prevent type flaw attacks on security protocols.In :Proceedings of the 13th IEEE Computer SecurityFoundations Workshop.IEEE Computer Society Press, 2000.255 —268. [ 2 ] F Javier Thayer Fábrega, Jonathan C Herzog, Joshua D Guttman.Strand spaces :proving security protocols correct.Journal of Computer Securi ty,1999, 7(2, 3):191 —230. [ 3 ] Joshua D Guttman, F Javier Thayer Fábrega.Authentication tests and the structure of bundles.Theoretical Computer Science, 2002, 283(2):333 —380. [ 4 ] Gavin Lowe.An attack on the Needham-Schroeder public key authentication protocol.Information Processing Letters, 1995, 56(3):131—136. [ 5 ] Catherine Meadows.Analyzing the Needham-S chroeder publi c-key protocol:a comparison of two approaches.In:ESORICS′96.LNCS 1146,1996.351 —364 |