1Abadi M, Burrows M, Needham M .Alogic of authentication[J]. ACM Transactions on Computer Systems, 1990, 8(1): 18-36.
2Kailar R. Accountability in electronic commerce protocols[J]. IEEE Transactions on Software Engineering, 1996, 22(5): 313-328.
3O'Too le K R . The internet billing server transaction proto- col alternatives[R]. N I TR 1994 - 1, Carnegie M ellon Univer-sity: Information Networking Institute, 1994.