Formal analysis of Needham-Schroeder protocol with authentication test methods
LI Ting-yuan1,2,QIN Zhi-guang1,LIU Xiao-dong2,ZHANG Xuan-fang2
Computer Engineering and Applications . 2010, (19): 100 -102 .  DOI: 10.3778/j.issn.1002-8331.2010.19.029