[1] Veronique C, Steve K, Bogdan W. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems[J]. Journal of Automated Reasoning, 2011, 46(3-4): 225-259.
[2] Vincent C, Hubert C, Stephanie D. Automating Security Analysis: Symbolic Equivalence of Constraint Systems[C]//The 5th International Joint Conference on Automated Reasoning. Wroclaw: Springer, 2010: 412-426.
[3] Stephanie D, Steve K, Mark D R. Symbolic Bisimulation for the Applied pi Calculus[J]. Journal of Computer Security, 2010, 18(2): 317-377.
[4] Chevalier Y, Küsters R, Rusinowitch M, et al. An NP Decision Procedure for Protocol Insecurity with XOR[J]. Theoretical Computer Science, 2005, 338(1-3): 247-274.
[5] Ralf K, Tomasz T. On the Automatic Analysis of Recursive Security Protocols with XOR[C]//24th Annual Symposium on Theoretical Aspects of Computer Science. Aachen: Springer, 2007: 646-657.
[6] Veronique C, Gavin K, Graham S. Automatic Analysis of the Security of XOR-Based Key Management Schemes[C]//13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Braga: Springer, 2007: 538-552.
[7] Ralf K, Tomasz T. Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach[C]//15th ACM Conference on Computer and Communications Security. Alexandria: ACM, 2008: 129-138.
[8] Alessandro A, Luca C. SAT-based Model-checking for Security Protocols Analysis[J]. International Journal of Information Security, 2008, 7(1): 3-32.
[9] Marques-Silva J P, Sakallah K A. GRASP—a Search Algorithm for Propositional Satisfiability[J]. IEEE Trans on Computers, 1999, 48(5): 506-521.
[10] 杜志强, 沈玉龙, 马建峰, 等. 一种实用的传感器网络广播认证协议[J]. 西安电子科技大学学报, 2010, 37(2): 305-310.
Du Zhiqiang, Shen Yulong, Ma Jianfeng, et al. Practical Broadcast Authentication Protocol for Sensor Networks[J]. Journal of Xidian University, 2010, 37(2): 305-310. |