1. M. Abadi and A. Gordon. A calculus for cryptographic protocols the spi calculus. In Proceedings of the Fourth ACM Conference on Computer and Communications Security, April 1997. To appear.
2. M. Bellare and P. Rogaway. Provably secure session key distribution—the three party case. In Proceedings of the 27th Annual ACM Symposium on Theory of Computing, pages 57–66, 1995.
3. D. Bolignano. An approach to the formal verification of cryptographic protocols. In Proceedings of the 3rd ACM Conference on Computer and Communication Security, 1996.
4. M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Technical Report 39, DEC Systems Research Center, February 1989.
5. D. Craigen and M. Saaltink. Using EVES to analyze authentication protocols. Technical Report TR–96–5508–05, ORA Canada, 1996.