1. Lecture Notes in Computer Science;R.M. Amadio,2002
2. Ateniese, G., Steiner, M., Tsudik, G.: Authenticated group key agreement and friends. In: Proceedings of the 5th ACM Conference on Computer and Communication Serucity (CCS 1998). ACM Press, New York (1998)
3. Bryans, J., Schneider, S.A.: CSP, PVS, and a recursive authentication protocol. In: DIMACS Workshop on Formal Verification of Security Protocols (1997)
4. Bull, J.A., Otway, D.J.: The authentication protocol, Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/-03, Defence Research Agency, Malvern, UK (1997)
5. Lecture Notes in Computer Science;Y. Chevalier,2003