1. Makoto Tatebayashi, Ntsume Matsuzaki, David B Newman Jr. Key Distribution Protocol for Pigital Mobile Communication Systems.In: Proceedings of CRYPTO'89,324^-3342. M Burrows, M Abadi, R Needham. A Logic of Authentication. In: Research Report 39, Digital Systems Research Center, 1989;Parts and versions of this material have been presented in many places including: ACM Transactions on Computer Systems, 1989, 8(1):18^36;Proceedings of the Royal Society of Lond on A, 1989, 426:233一2713. D Dolev, O Grumberg, D Peled. Model Checking. MTN Press, 19994. P F Syverson, P C van Oorschot. On Unified Some Cryptographic Protocol Logics. In: Proceedings of the 1994 IEEE Computer Soci-ety Press, 19945. I. Gong, R Needham, R Yahalom. Reasoning about Belief in Cryptographic Protocols. In: Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, California, 1990, 234^-2486. 冯登国.国内外信息安全研究现状及其发展趋势.网络安全技术与应用,2001,1(1): 8 137. 范红,冯登国.安全协议形式化分析的研究现状与有关问题.网络安全技术与应用,2001,1(8):12 ^ 15 |