Burrows M, Abadi M, Needham R. A logic of authentication[J].ACM Transacation on Computer Systems.1990, 8(1):18-36[2]Gaarder P, Snekkenes E. Applying a formal analysis technique to CCITT X.509 strong two-way authentication protocol, Journal of Cryptology 1991, (3): 81-98.[3]Boyd C, Mao W. On a Limitations of BAN Logic. In Lecture Notes in Computer Science 765Ad-[4]vances in Cryptology-Eurocrypt93, Lofthus Norway: Springer-Verlag, 1993, 240-247.[5]Wenbo Mao. An augmentation of BAN-like logics. 8th IEEE Computer Security Foundations Workshop, Dromquinna Manor Kenmare County Kerry, Ireland: 1995, 44-58.[6]Paul F. Syverson. A new look at old protocol. Operating System Review, 1997, 31(1): 1-4.[7]Nessett D M. A Critique of Burrows, Abadi and Needham Logic, Operating Systems Review, 1990,24(2): 35-38.[8]Li Gong, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols. In Pro-[9]ceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California: 1990, 234-248.[10]Abadi M, Tuttle M. A semantics for a logic of authentication. In Proceedings of the Tenth ACM Symposium on Principles of Distributed Computing, ACM Press, Sanantonio, Texas: 1991, 201-216.[11]Syverson P, Van Oorschot P C. On unifying some cryptographic protocol logics. In Proceeding of 1994 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Okland California: 1994.[12]Van Oorschot P C. Extending cryptographic logics of belief to key agreement protocols (Extended Abstract). In Proceeding of the First ACM Conference on Computer and Communications Secu-[13]rity, Faixfax Virginia: 1993, 232-243.[14]Wedel G, Kessler V. Formal semantics for authentication logics. Computer Security-[15]ESORICS96, United Kingdom: 1996, 219-239.[16]Kesser V, Wedel G. AUTOLOG-An Advanced Logic of Authentication. Proc. of the Computer[17]Security Foundations Workshop VII, Franconia, IEEE Computer Society Press. New Hampshire: 1990,90-94.
|