[1]
Ray I, Natarajan N. An anonymous and failure resilient fair exchange e-commerce protocol [J]. Decision Support Systems, 2005, 39: 267-292.
DOI: 10.1016/j.dss.2003.10.011
Google Scholar
[2]
Zhang Q, Markantonakis K, Mayes K. A practical fair-exchange e-payment protocol for anonymous purchase and physical delivery [C]/ Proc of IEEE Int Conf on Computer System and Application. Washing D C: IEEE Press, 2006: 850-858.
DOI: 10.1109/aiccsa.2006.205188
Google Scholar
[3]
Das Vinu V. Secure and anonymous electronic commerce protocol over a public network [C]/ 2nd International Conference on Internet Multimedia Services Architecture and Applications. Washing D C: IEEE Press, 2008: 1-6.
DOI: 10.1109/imsaa.2008.4753930
Google Scholar
[4]
Lowe G. Casper: a compiler for the analysis of security protocols [J]. Journal of Computer Security, 1998, 6: 53-84.
Google Scholar
[5]
Formal Systems (Europe) Ltd. Failure Divergence Refinement FDR2 User Manual, version 2. 83 edition 2007 [R/OL]. [2012-04-20]. http: /www. fsel. com/documentation/fdr2/fdr2maual. pdf.
Google Scholar
[6]
Qing Sihan. Twenty years development of security protocols research [J]. Journal of Software, 2003, 14(10): 1740-1752.
Google Scholar
[7]
Han Z G , Luo J Z, Wang L M. Extended-CSP based analysis of non-repudiation protocols [J]. Journal on Communications, 2008, 29(10): 8-18.
Google Scholar
[8]
Xu Yang, Xie Xiaoyao. Extending Rubin logic for electronic commerce protocols [C]/ 2nd International Conference on Anti-counterfeiting, Security and Identification. Washing D C: IEEE Press, 2008: 448-451.
DOI: 10.1109/iwasid.2008.4688446
Google Scholar
[9]
Xue Rui, Feng Dengguo. The approaches and technologies for formal verification of security protocols [J]. Chinese Journal of Computers, 2006, 1(29): 1-20.
Google Scholar