1. I. Cervesato. A specification language for crypto-protocol based on multiset rewriting, dependent types and subsorting. In G. Delzanno, S. Etalle, and M. Gabbrielli, editors, Proceedings of the Workshop on Specification, Analysis and Validation for Emerging Technologies-SAVE' 01 pages 1–22, Paphos, Cyprus, 2001.
2. I. Cervesato. Typed MSR: Syntax and examples. In V. Gorodetski, V. Skormin, and L. Popyack, editors, First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security — MMM''01, pages 159–177, St. Petersburg, Russia, 2001. Springer-Verlag LNCS 2052.
3. I. Cervesato. Fine-Grained MSR Specifications for Quantitative Security Analysis. In Fourth Workshop on Issues in the Theory of Security — WITS' 04, pages 111–127, 2004.
4. Y. Chevalier, R. Kiisters, M. Rusinowitch, and M. Turuani. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. In FSTTCS 2003: Foundations of Software Technology and Theoretical Computer Science — 23rd Conference. Springer-Verlag LNCS 2914, 2003.
5. K. Christou, I. Lee, A. Philippou, and O. Sokolsky. Modeling and analysis of power-aware systems. In 9th International Conference on Tools and Algorithms for the Construction and Analysis of Systems — TACAS 2003, pages 409–425, Warsaw, Poland, 2003. Springer-Verlag LNCS2619.