1. Lecture Notes in Computer Science;G. Bella,2001
2. Gürgens, S., Ochsenschläger, P., Rudolph, C.: Role based specification and security analysis of cryptographic protocols using asynchronous product automata. GMD Report 151, GMD – Forschungszentrum Informationstechnik GmbH (2001)
3. Lecture Notes in Computer Science;S. Gürgens,2002
4. Gürgens, S., Ochsenschläger, P., Rudolph, C.: Role based specification and security analysis of cryptographic protocols using asynchronous product automata. In: DEXA 2002 International Workshop on Trust and Privacy in Digital Business, IEEE, Los Alamitos (2002)
5. Kim, K., Park, S., Baek, J.: Improving fairness and privacy of zhou-gollmann’s fair non-repudiation protocol. In: Proceedings of 1999 ICPP Workshop on Security, pp. 140–145 (1999)