1. Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Technical Report RR-5169, INRIA (April 2004), An up-to-date version will be kept at
http://www.loria.fr/~cortier/publis.html
2. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of the 28th ACM Symposium on Principles of Programming Languages (POPL 2001), January 2001, pp. 104–115 (2001)
3. Abadi, M., Gordon, A.D.: A bisimulation method for cryptographic protocols. Nordic Journal of Computing 5(4), 267–303 (1998)
4. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation 148(1), 1–70 (1999)
5. Lecture Notes in Computer Science;R.M. Amadio,2000