Formal analysis method suitable to security protocols with timestamp
FAN Yutao1, SU Guiping2
1.Department of Computer Science, North China Institute of Science & Technology, Yanjiao, Beijing 101601, China
2.School of Information Science and Engineering, Graduate University of the Chinese Academy of Sciences, Beijing 100049, China
FAN Yutao1, SU Guiping2. Formal analysis method suitable to security protocols with timestamp[J]. Computer Engineering and Applications, 2012, 48(36): 116-120.