| Citation: | LIU Yi-wen, LI Wei-qin. Hierarchy Requirements and Verification for Cryptographic Protocols[J]. Journal of Beijing University of Aeronautics and Astronautics, 2002, 28(5): 589-592. (in Chinese) | 
	                | 
					 [1] Roscoe A W. Intensional specifications of security protocols . In:Guttman J, ed. Proceedings of 9th IEEE Computer Security Foundations Workshop . Los Alamitos:IEEE Computer Society, 1996. 28~38.[2]Boyd C. Towards extensional goals in authentication protocols .[3]Paulson L C. The inductive approach to verifying cryptographic protocols[J]. Journal of Computer Security, 1998, 6(1/2):85~128.[4]Abadi M, Tuttle M R. A semantics for logic of authentication . In:Proceedings of the 10th ACM Symposium on Principles of Distributed Computing . New York:ACM Press, 1991. 201~216.[5]Meadows C. A model of computation for the NRL protocol analyzer . In:Gong L, ed. Proceedings of Computer Security Foundations Workshop VII .Los Alamitos:IEEE Computer Society Press, 1994. 84~89.[6]Syverson P F. Adding time to a logic of authentication . In:Sandhu R, ed. Proceedings of the First ACM Conference on Computer and Communications Security . New York:ACM Press, 1993. 97~101. 
					
					 |