[1] Alan Ofreier, Philip Karlton, Paul CKocher. The SSL version 31 0, interne-t draft, netscape communications. 1996. http:PPwp. netscape. comPengP ssl3Pss-l toc. html[2] DWagner, BSchneiner. Analysis of the SSL 31 0 protocol. In: 2nd USENIX Workshop on Elecctronic Commerce. 1996. http:PPwww. schneier. comPpaper-ssl. pdf[3] JCMitchell, VShmat ikov, USt ern. Finite-state analysis of SSL 31 0. In: 7th USENIX Security Symposium, San Ant onio. 1998. 201~216[4] SDietrich. A formal analysis of the secure socket s layer protocol : [Ph. D. thesis]. Dept Mathematics and Comput er Science. Adelphi University, 1997[5] Zhang YQ. Study on analysis of security protocol of computer communicat ion network: [Ph. D. thesis]. Xidian University, 2000(in Chinese with English abstract)[6] Will Marrero, Edmund Clarke, Somesh Jha. A model checker for authent ication protocols. In: Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Prot ocols. 1997. dimacs. rutgers. eduPWorkshopsPSecurityPprogram2Pmarrero. ps[7] Zhang YQ,Li JH, Xiao GZ. An approach to the formal verificat ion of the two-party cryptographic protocols. ACM Operating Systems Review, 1999,33(4) : 48~51 |