[1]
Carlsen U.: Cryptographic protocol flaws know your enemy, Proceedings of the 7th IEEE Computer Security Foundations Workshop. Franconia, NH: IEEE Computer Society Press, 1994, pp.192-200.
DOI: 10.1109/csfw.1994.315934
Google Scholar
[2]
Gritzalis S. and Spinellis D.: Cryptographic protocols over open distributed systems: a taxonomy of flaws and related protocol analysis tools, Proceedings of the 16th International Conference on computer Safety, Reliability and Security, Ney York, UK, 1997, pp.123-137.
DOI: 10.1007/978-1-4471-0997-6_10
Google Scholar
[3]
G. L. Wang and S. H. Qing: A new cryptographic protocol attack classification method, Proceedings of 1st Information and Communication Security conference, Beijing, 2000, pp.136-141.
Google Scholar
[4]
Syverson P.: A taxonomy of replay attacks, Proceedings of the 7th IEEE Computer Security Foundations Workshop. Franconia, NH: IEEE Computer Society Press, 1994, pp.131-136.
DOI: 10.1109/csfw.1994.315935
Google Scholar
[5]
J. F. Liu and M. T. Zhou: Research and Taxonomy of Replay Attacks on Security Protocol, Application Researches of Computers, vol. 24, 2007, pp.135-139.
Google Scholar
[6]
J. L. Zhuo, X. X. Li and J. X. Li: A New Taxonomy of Attacks on Security Protocols and Their Security Evaluation, Journal of Computer Research and Development, vol. 42, 2005, pp.1100-1107.
DOI: 10.1360/crad20050702
Google Scholar
[7]
Dolev D., Yao A. C. On the security of public key protocols, IEEE Transaction on Information Theory, vol. 29, 1983, pp.198-208.
DOI: 10.1109/tit.1983.1056650
Google Scholar
[8]
D. Huang, W. D. Hu and K. F. Chen: Classification of Network Attack and Anti-attack, Computer Engineering, vol. 27, 2001, pp.132-133.
Google Scholar
[9]
Lomas M., Gong Li and Saltzer J. H.: Reducing risks from poorly chosen keys, ACM SIGOPS Operating Systems Review, vol. 23, 1989 , pp.14-18.
DOI: 10.1145/74851.74853
Google Scholar
[10]
Gong Li: A security risk of depending on synchronized clocks, ACM SIGOPS Operating Systems Review, vol. 26, 1992, pp.49-53.
DOI: 10.1145/130704.130709
Google Scholar
[11]
Guttman J. D., Fabrega J. T.: Protocol independence through disjoint encryption, Proceedings of the 13th IEEE Computer Security Foundations Workshop. Washington DC: IEEE Computer Society, 2000, pp.24-34.
DOI: 10.1109/csfw.2000.856923
Google Scholar