1. Arapinis, M., Duflot, M.: Bounding messages for free in security protocols (extended version) (2007),
http://www.arapinis.org/publications/fsttcs07ext.pdf
2. Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. TCS: Theoretical Computer Science 333 (2005)
3. Comon, H., Cortier, V.: Tree automata with one memory, set constraints and cryptographic protocols. Research Report LSV-01-13, Laboratoire Spécification et Vérification, ENS Cachan, France, p. 98 (2001)
4. Lecture Notes in Computer Science;V. Cortier,2007
5. Clark, J.A., Jacob, J.L.: A survey of authentication protocol literature (1997)