1. N.A. Brock and D.M. Jackson. Formal Verification of a Fault Tolerant Computer. In Proceedings of 1992 Digital Avionics Systems Conference. IEEE, 1992.
2. http://wwH.mcs.le.ac.uk/~gloHe/security/casper/index.html . World Wide Web page.
3. Sadie Creese. An inductive technique for modelling arbitrarily configured networks. MSc thesis, Oxford University Computing Laboratory, 1997.
4. Michael Goldsmith and Bill Roscoe. The perfect’ spy’ for model-checking cryptoprotocols. In Proceedings of DIMACS Workshop on Design and Formal Verification of Cryptographic Protocols, Rutgers, 1997.
5. C.A.R. Hoare. Communicating Sequential Processes. Prentice-Hall International, Englewood Cliffs, New Jersey, 1985.