3Guttman. Strand Space : Why is a security protocol correct [ C ]. In: Proc 18th IEEE Symposium on Research in Security and Privacy,IEEE Computer Society Press, 1998,1.
4F Javier Thayer Fabrega , Jonathan C Herzog, Joshua D.
5F Javier Thayer Fabrega , Jonathan C Heizog, Joshua D Guttman. Strand Space: Proving security protocols correct [ J ]. Journal of Computer Security, 1999,7 : 191 - 230.
6F Javier Thayer Fabrega , Jonathan C Herzog, Joshua D Guttman. Honest ideals on strand space [ C ]. In : Proc 11 th IEEE Computer Security Foundations Workshop,IEEE Computer Society Press, 1998,01.
7Guttman J D, Thayer F J. Authentication tests and the structure of bundles [ J ]. Theoretical Computer Science, 2001.
8Guttman J D, Thayer F J. Key Compromise, Strand Spaces and the Au- thentication Tests[ M ]. Published by Elsevier Science BV, 2002.
9Maggi P, Sisto R. Using SPIN to Verify Security Protocols [C]//Proc of the 9th Int'l SPIN Workshop on Model Checking of Software, 2002:187-204.
10Lowe G. Breaking and Fixing the Needham-Schroder Publickey Protocol Using FDR[M]//Tools and Algorithms for the Construction and Analysis of Systems, 1996:147-166.