M. Burrows, M. Abadi, R. Needham, A logic of authentication, ACM Trans. on computer system,1990, 8(1), 18-36.[2]C. Boyd, W. Mao, On a limitations of BAN logic, In Lecture Notes in Computer Science, 765,Berlin, springer-verlag, 1993, 240-247.[3]D.M. Nessett, A critique of Burrows, Abadi and Needham logic. Operating System Review,1990, 24(2), 35-38.[4]L. Gong, R. Needham, R. Yahalom, Reasoning about belief in cryptographic protocol, Proc.,IEEE Symp. Security and Privacy, Oakland, Calif., 1990, 234-248.[5]B. Syverson, Paul, V. Oorschot, On unifying some cryptographic protocol logics, Proc. IEEE Svmp., Security and Privacy, Oakland, Calif., 1994, 14-28.[6]卿斯汉,关于密码协议分析的注记,China Crypt96,vhengzhou,1996,214-219.[7]郑东,王常杰,王育民,一种BAN逻辑的修正,电子科学学刊,2000,22(4),579-584.[8]宋荣功,胡正名,杨义先,对BAN逻辑中新鲜子的研究,电子科学学刊,2000,22(3),505-508.
|