1. Woo, T.Y., Lam, S.S.: A Semantic Model for Authentication Protocols. In: Proceedings of the S&P 1993, pp. 178–194. IEEE Computer Society Press, Los Alamitos (1993)
2. Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols: The Spi Calculus. In: Proceedings of the CCS 1997, pp. 36–47. ACM Press, New York (1997)
3. Lecture Notes in Computer Science;M. Boreale,2001
4. Bella, G.: Inductive Verification of Cryptographic Protocols. PhD thesis, University of Cambridge (2000)
5. Bellare, M., Rogaway, P.: Provably Secure Session Key Distribution: The Three Party Case. In: Proceedings of the STOC 1995, pp. 57–66. ACM Press, New York (1995)