[1]WANG Qian, YANG Deli. The study on atomic electronic cash protocol[A].Proceedings of International Symposium on Future Software Technology[C]. Wuhan: HUST Press,2002.26-29.
[2]CAMP J, HARKAVY M,TYGAR J D, YEE B. Anonymous atomic transactions[A]. Proceeding of the 2nd Usenix Workshop on Electronic Commerce[C].ACM Press,1996.123-133.
[3]CAMP J. An atomcity-generating protocol for anonymous currencies[J]. IEEE Transactions on Software Engineering, 2001,27(3):272-278.
[4]WANG Qian, YANG Deli. The research of dual-mode electronic cash system[A]. Proceedings of 2002 International Conference on Management Science&Engineering[C].Harbin:Harbin Institute of Technology Press,2002.1609-1613.
[5]BURROWS M, ABADI M, NEEDHAM R M. A logic of authentication[J]. ACM Transacion on Computer System,1990, 8 (1):18-36.
[6]BURMESTER M. On the risk of opening distributed keys[A]. In Advanced in Cryptology-CRYPTO94[C]. Berlin: Springer-Verlag, LNCS (839),1994.308-317.
[7]NEUMAN B C, THEODORE,T S. An authentication service for compute network[J]. IEEE Communication Magazine,1990, 132(9):33-38.
[8]BOYD C, MAN W. On a limitation of BAN logic[A]. In Advances in Cryptology-Eurocrypt93, Vol 765 of Lecture Notes in Computer Science[C]. Berlin:Springer-Verlag,1993.240-247.
[9] MAO W, BORD C. Towards the formal analysis of security protocol[A]. Proc of the Computer Security Foundations Wordshop VI[C].USA:IEEE Computer Society Press,1993.147-158.
[10]ZHANG Yuqing,LI Jihong, XIAO Guozhen. BAN logic for cryptographic protocols analysis and its limitions[J]. Journal of Xidian University,1999,26(3):376-378(in Chinese).[张玉清,李继红,肖国镇.密码协议分析工具-BAN逻辑及其缺陷[J].西安电子科技大学学报,1999,26(3):376-378.]
|