参考文献/References:
[1]Dolev D, Yao A. On the security of public key protocols[J]. IEEE Transactions on Information Theory,1983,29(2):198-208.
[2]钟军,吴雪阳,江一民,等.一种安全协议的安全性分析及攻击研究[J].计算机工程与科学,2014,36(6):1077-1082.
[3]冉俊铁,吴尽昭.基于SPIN的安全协议形式化验证技术[J].计算机应用,2014:34(S2):85-90.
[4]陈春玲,田国良.安全协议的SPIN建模与分析[J].南京航空航天大学学报,2009,41(5):672-676.
[5]Fu Yulong, Ousmane K. A finite transition model for security protocol verification[C]//Proc of 6th International Conference on Security of Information and Networks. Aksaray, Turkey,2013.
[6]龙士工,王巧丽,李祥.密码协议的Promela语言建模及检测[J].计算机应用,2005,25(7):1548-1550.
[7]Kanovich M, Kiriginc T B, Nigamd Vi,et al. Bounded memory DolevYao adversaries in collaborative systems[J]. Information and Computation, 2014, 238: 233-261.
[8]Mazare L. Satisfiability of DolevYao constraints[J]. Electronic Notes in Theoretical Computer Science,2005,125(1):109-124.
[9]Otway D, Rees O. Efficient and timely mutual authentication[J]. ACM Operating Systems Review,1987,21(1):8-10.
[10]Abadi M, Needham R. Prudent engineering practice for cryptographic protocols[J]. IEEE Transactions on Software Engineering,1996,22(1):6-15.