[ 1] M enezes A, van Oorscho t P, Vanstone S. H andbook o f Applied Cryptog raphy[M ] . USA: CRC Press Inc, 1997.
[ 2] B lake-W ilson S, M eneses A. Unknown key- sha re a ttacks on the station-to- sta tion ( STS) protoco l[ D]. Canada: Univers ity o f W a terloo, 1998.
[ 3] 韦卫, 王德杰, 张英, 等. 基于SSL的安全WWW 系统的研究与实现[ J]. 计算机研究与发展, 1999, 36( 5): 619-624.
W eW e ,i W ang De jie, Zhang Y ing, e t a.l Study and imp lem enta tion o f a securew orld w idew eb system based on secure so ckets layer[ J] . Journa l of Computer Research and Dev elopment, 1999, 36( 5): 619-624. ( in Chinese)
[ 4] BurrowM, Abad iM, Needham R. A log ic of authen tication[ J]. ACM Transactions on Com pute r System s, 1990, 8( 1): 18-36