[1] THAYER FABREGA F J, HERZOG J C, GUTTMAN J D. Strand space: why is a security protocol correct [C]// Proceedings of the 1998 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 1998: 160-171. [2] THAYER FABREGA F J, HERZOG J C, GUTTMAN J D. Honest ideals on strand space [C]// Proceedings of the 11th IEEE Computer Security Foundations Workshop. Piscataway: IEEE, 1998: 66-77. [3] THAYER FABREGA F J, HERZOG J C, GUTTMAN J D. Strand space: proving security protocols correct [J]. Journal of Computer Security, 1999, 7(2/3): 191-230. [4] GUTTMAN J D, THAYER FABREGA F J. Key compromise, strand spaces and the authentication tests [J]. Electronic Notes in Theoretical Computer Science, 2001, 45: 1-21. [5] GUTTMAN J D, THAYER FABREGA F J. Authentication tests and the structure of bundles [J]. Theoretical Computer Science, 2002, 283(2): 333-380. [6] MUHAMMAD S. Applying authentication tests to discover Man-In-The-Middle attack in security protocols [C]// Proceedings of the 8th International Conference on Digital Information Management. Piscataway: IEEE, 2013: 35-40. [7] ZHANG G, RONG M, FANG Y. One extension of authentication test based on strand space model [C]// Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing. Piscataway: IEEE, 2009: 1-4. [8] XIONG L, PENG D. An improved authentication test for security protocol analysis [J]. Communications Technology, 2014, 47(8): 951-954.(熊玲,彭代渊.一种改进的安全协议认证测试分析方法[J].通信技术,2014,47(8):951-954.) [9] YAN L, PENG D, GAO Y. Analysis and improvement of sensor networks security protocol [J]. Journal on Communications, 2011, 32(5): 139-144.(闫丽丽,彭代渊,高悦翔.传感器网络安全协议的分析和改进[J].通信学报,2011,32(5):139-144.) [10] GUTTMAN J D. Security protocol design via authentication tests [C]// Proceedings of the 2002 IEEE Computer Security Foundations Workshop. Washington, DC: IEEE Computer Society, 2002: 92-103. [11] GUTTMAN J D. Cryptographic protocol composition via the authentication tests [C]// FOSSACS'09: Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures: Held as Part of the Joint European Conferences on Theory and Practice of Software, LNCS 5504. Berlin: Springer, 2009: 303-317. [12] LIU J, ZHOU M. Designing authentication protocols via authentication test [C]// Proceedings of the 2007 IEEE Symposium on Computers and Communications. Piscataway: IEEE, 2007: 475-480. [13] LIU J, ZHOU M. Break through the limitation of authentication test [J]. Journal of Software, 2009, 20(10): 2799-2809.(刘家芬,周明天.突破认证测试的局限性[J].软件学报,2009,20(10):2799-2809.) [14] SONG W. Limitations of authentication test in the analysis of multi-party security protocols [C]// Proceeding of the 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer. Piscataway: IEEE, 2013: 2243-2247. [15] YU L, WEI S. Analysis on properties for principals' keys on construction of test components [J]. Computer Engineering and Applications, 2013, 49(6): 114-117.(余磊,魏仕民.协议主体密钥在测试组件构造上的性质分析[J].计算机工程与应用,2013,49(6):114-117.) [16] DOGHMI S F, GUTTMAN J D, THAYER F. Completeness of the authentication test [C]// Proceedings of the 12th European Symposium on Research in Computer Security. Piscataway: IEEE, 2007: 106-121. [17] FRÖSCHLE S. Adding branching to the strand space model [J]. Electronic Notes in Theoretical Computer Science, 2009, 242(1): 139-159. [18] GUTTMAN J D. Security goals and protocol transformations [C]// TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications, LNCS 6993. Berlin: Springer, 2011: 130-147. [19] GUTTMAN J D. State and progress in strand spaces: proving fair exchange [J]. Journal of Automated Reasoning, 2012, 48(2): 159-195. [20] BODEI C, DEGANO P, GAO H, et al. Detecting and preventing type flaws: a control flow analysis with tags [J]. Electronic Notes in Theoretical Computer Science, 2007, 194(1): 3-22. [21] BURROWS M, ABADI M, NEEDHAM R. A logic of authentica-tion [J]. ACM Transactions on Computer Systems, 1989, 8(1): 18-36. [22] SYVERSON P. A taxonomy of replay attacks [C]// Proceeding of the 7th IEEE Computer Security Foundations Workshop. Piscataway: IEEE, 1994: 187-191. [23] DIERKS T, ALLEN C. The TLS Protocol Version 1.0, RFC 2246 [S/OL]. [2014-12-23]. http://www.ietf.org/rfc/rfc2246.txt. [24] WANG D, WANG P, LEI M. Cryptanalysis and improvement of gateway-oriented password authenticated key exchange protocol based on RSA [J]. Acta Electronica Sinica, 2015, 43(1): 176-184.(汪定,王平,雷鸣.基于RSA的网关口令认证密钥交换协议安全性分析与改进[J].电子学报,2015,43(1):176-184.) |