A new model for analyzing security protocols formally

MU Jian-jun
J4 . 2006, (3): 381 -385 .