Formal analysis method suitable to security protocols with timestamp
FAN Yutao1, SU Guiping2
Computer Engineering and Applications . 2012, (36): 116 -120 .