1. Abadi, M., Needham, R.M.: Prudent engineering practice for cryptographic protocols. IEEE Trans. Software Eng. 22(1), 6–15 (1996)
2. Lecture Notes in Computer Science;R. Amadio,2002
3. Andova, S., Cremers, C., Steen, K.G., Mauw, S., lsnes, S.M., Radomirović, S.: Sufficient conditions for composing security protocols. Information and Computation (to appear, 2007)
4. Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: CSFW 2001. Proc. 14th Computer Security Foundations Workshop, pp. 82–96. IEEE Computer Society Press, Los Alamitos (2001)
5. Lecture Notes in Computer Science;B. Blanchet,2003