1. D. Dolev, A. Yao, in Proceedings of the $$22{\rm nd}$$ Annual Symposium on Foundations of Computer Science (1981), pp. 350–357
2. C. Bodei, P. Dagano, Theoret. Comput. Sci. 283(2), 271 (2002)
3. G.P. Hancke, M.G. Kuhn, in Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (ACM Press, Athens, Greece, 2005), pp. 67–73
4. I. Cervesato, in Proceedings of the $$16{\rm th}$$ Annual Symposium on Logic in Computer Science, ed. by J. Halpern (IEEE Computer Society Press, Boston, MA, U.S.A., 2001), pp. 246–265