1. Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoret. Comput. Sci. 367(1–2), 2–32 (2006)
2. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: POPL, pp. 104–115. ACM (2001)
3. Almousa, O., Mödersheim, S., Modesti, P., Viganò, L.: Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment. In: ESORICS 2015, 2015, to appear,
http://compute.dtu.dk/~samo
4. Almousa, O., Mödersheim, S., Viganò, L.: Alice and Bob: reconciling formal models and implementation (Extended Version). Technical report 2014-10, DTU Compute (2015).
http://www.imm.dtu.dk/~samo/
5. Lecture Notes in Computer Science;A Armando,2012