[1] Gavin Lowe. Analysing protocols subject to guessing attack. Journal of Computer Security, 2004, 12(1): 83-98. [2] Tom Chothia. Guessing attacks in the pi-calculus with a computational justification. 2005 (2005-03-15). http://citesteer.ist.psu.edu/722911.html. [3] 沈海峰, 薛锐, 黄河燕, 等. 串空间理论扩展[J]. 软件学报, 2005, 16(10): 1784-1789. Shen Haifeng, Xue Rui, Huang Heyan, et al. Extending the theory of strand spaces[J]. Journal of Software, 2005, 16(10): 1784-1789. [4] 李莉, 薛锐, 张焕国, 等. 基于口令认证的密钥交换协议的安全性分析. 电子学报, 2005, 33(1): 166-170. Li Li, Xue Rui, Zhang Huanguo, et al. Security analysis of authenticated key exchange protocol based on password[J]. Acta Electronica Sinica, 2005, 33(1): 166-170. [5] Fabrega F J Thayer, Herzog J C, Guttman J D. Strand spaces: proving security protocols correct[J]. Journal of Computer Security, 1999, 7(2/3): 191-230. [6] Li Gong, Lomas T Mark A, Needham Roger M, et al. Protecting poorly chosen secrets from guessing attacks[J]. IEEE Journal on Selected Areas in Communications, 1993, 11(5): 648-656. |