M. Burrows, M. Abadi, R. Needham, A logic of authentication, ACM Trans. on computer system,1990, 8(1), 18-36.[2]C. Boyd, W. Mao, On a limitations of BAN logic, In Lecture Notes in Computer Science, 765,Berlin, springer-verlag, 1993, 240-247.[3]D.M. Nessett, A critique of Burrows, Abadi and Needham logic. Operating System Review,1990, 24(2), 35-38.[4]L. Gong, R. Needham, R. Yahalom, Reasoning about belief in cryptographic protocol, Proc.,IEEE Symp. Security and Privacy, Oakland, Calif., 1990, 234-248.[5]B. Syverson, Paul, V. Oorschot, On unifying some cryptographic protocol logics, Proc. IEEE Svmp., Security and Privacy, Oakland, Calif., 1994, 14-28.[6]卿斯?jié)h,關(guān)于密碼協(xié)議分析的注記,China Crypt96,vhengzhou,1996,214-219.[7]鄭東,王常杰,王育民,一種BAN邏輯的修正,電子科學(xué)學(xué)刊,2000,22(4),579-584.[8]宋榮功,胡正名,楊義先,對BAN邏輯中新鮮子的研究,電子科學(xué)學(xué)刊,2000,22(3),505-508.
|