1. Bruce Schneier.应用密码学.北京:机械工业出版社,20002. Ulf Carlsen. Cryptographic protocol flaws. In: Proceedings 7th IEEE Computer Security Foundations Workshop, IEEE Computer Society, 1994.192^2003. M Tatebayashi, N Matsuzaki,D B Newman Jr. Key Distribution Protocol for Digital Mobile Communication Systems. In: Advances in Cryptology: Proc Crypto'89, Lecture Notes in Computer Science: 435, Springer Verlag, 1990.324一3334. F Javier Thayer Fabrega, Jonathan C Herzog, Joshua D Gunman. Strand Spaces: Why is a security protocol correct? 1n: Proceed-ings of the 1998 IEEE Symposium on Security and Privacy: IEEE Computer Press, 1998. 160-1715. F Javier Thayer Fabrega, Jonathan C Herzog, Joshua D Gunman. Honest Ideais on Strand Spaces. In: Joshua Gunman. Proceed-ings of the Ilth Computer Security Foundations Workshop, IEEE Computer Society, Rockport, MA, 1998. 66一776. Al Maneki. Honest Functions and Their Application to the Analysis of Cryptographic Protocols. In: Proceedings of the Computer Security Foundations Workshop VI: IEEE Computer Society Press, 1993. 147一1587. F Javier Thayer Fabrega, Jonathan C Herzog,Joshua D Gunman. Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security, 1997(2/3):191 ^2308. Gavin Lowe, Bill Roscoe. Using CSP to Detect Errors in the TMN Protocol.IEEE Transactions(10):659一6699. Gavin Lowe. Breaking and Fixing the Needham-Schroeder Publirkey Protocol Using FDR.1n:Notes in (computer Science: 1055. Springer Verlag. 1996. 14715810. 朱文余,孙琦计算机密码应用基础.北京:科学出版社,2000 |