1. Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. Technical report, SRC DIGITAL (June 1994)
2. Buttyan, L.: Formal methods in the design of cryptographic protocols (state of the art). Technical Report No. SSC/1999/38, Swiss Federal Institute ofTechnology (EPFL), Lausanne (November 1999)
3. Carlsen, U.: Formal Specification and Analysis of Cryptographic Protocols. PhD thesis, Thèse d’Informatique soutenue à l’Université PARIS XI (October 1994)
4. Clark, J., Jacob, J.: A Survey of Authentication Protocol Literature, Unpublished Article Available at http://dcpu1.cs.york.ac.uk/~jeremy (August 1996)
5. Debbabi, M., Mejri, M., Tawbi, N., Yahmadi, I.: A New Algorithm for Automatic Verification of Authentication Cryptographic Protocols. In: Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, DIMACS Center, Core Building, Rutgers University, New Jersy, USA (September 1997)