1. Advanced Security Mechanisms for Machine Readable Travel Documents – Extended Access Control (EAC) – Version 1.11 Technical Guideline TR-03110, Federal Office for Information Security (BSI)
2. Dolev, D., Yao, A.: On the security of public-key protocols. IEEE Transactions on Information Theory 2(29) (1983)
3. Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6, 85–128 (1998)
4. Hutter, D., Rock, G., Siekmann, J.H., Stephan, W., Vogt, R.: Formal Software Development in the Verification Support Environment (VSE). In: Manaris, B., Etheredge, J. (eds.) Proceedings of the FLAIRS 2000. AAAI Press, Menlo Park (2000)
5. Denker, G., Millen, J., Rueß, H.: The CAPSL Integrated Protocol Environment. SRI Technical Report SRI-CSL-2000-02 (October 2000)