[1] Dolev D, Yao A. On the security of public-key protocols[J]. IEEE Trans on Information Theory, 1983, 29(2): 198-208. [2] Yohan B, Pierre-Cyrille H, Olga K. Tree automata for detecting attacks on protocols with algebraic cryptographic primitives[J]. Electronic Notes in Theoretical Computer Science, 2009, 239(1): 57-72. [3] Bruno B, Martín A, Cédric F. Automated verification of selected equivalences for security protocols[J]. Journal of Logic and Algebraic Programming, 2008, 75(1): 3-51. [4] Veronique C, Stephanie D, Pascal L. A survey of algebraic properties used in cryptographic protocols[J]. Journal of Computer Security, 2006, 14(1): 1-43. [5] David B, Sebastian M, Luca V. Algebraic intruder deductions//LPAR 2005. Montego Bay: Springer, 2005: 549-564. [6] 邱慧敏, 杨义先, 钮心忻. 无线传感器网络中广播通信的安全协议设计[J]. 北京邮电大学学报, 2006, 29(5): 103-106. Qiu Huimin, Yang Yixian, Niu Xinxin. Security protocol design about broadcast in wireless sensor network[J]. Journal of Beijing University of Posts and Telecommunications, 2006, 29(5): 103-106. [7] 邓淼磊, 马建峰, 周利华. RFID匿名认证协议的设计[J]. 通信学报, 2009, 30(7): 20-26. Deng Miaolei, Ma Jianfeng, Zhou Lihua. Design of anonymous authentication protocol for RFID[J]. Journal on Communications, 2009, 30(7): 20-26. |