1. Wilt Marrero, Edmund Clarke, Somesh Jha. A Model Checker for Authentication Protocols. In: C Meadows, H Orman, editors.Proceedings of the DIMACS Workshop on Design and Verication of Security Protocols. DIMACS, Rutgers University, 19972. C:[owe. Towards a Completeness Result for Model Checking of Security Protocols. Technical Report, Dept of Mathematics and Computer Science. University of f.eicester, 19983. F Javier Thayer Fabrega, Jonathan C Herzog, Joshua D Gunman. Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security, 1999,7:191一2304. F Javier Thayer Fabrega, Jonathan C Herzog, Joshua D (Gunman. Strand Space Pictures. In: Presented at the LICS Workshop on Formal Methods and Security Protocols, 19985. Lawrence C Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 19986. i.awrence C Paulson. Proving Properties of Security Protocols by Induction. In: 10th IEEE Computer Security Foundations Work-shop, IEEE Computer Society Press, 1997, 70一837. f.iu Yiwen, f.i Weiqin. The Model Reasoning Verifier for Cryptographic Protocols. In:Proceedings of the sixth International Confer-ence for Young Computer Scientist. 2001.290一2958. Liu Yiwen, Li Weiqin. Hierarchy Requirements and Verification for Cryptographic Protocols (in Chinese).Journal of Beijing Univer-sity of Aeronautics and Astronautics, 2002 |