1. Al-mahmud, A., Akhtar, R.: Secure sensor node authentication in wireless sensor networks. International Journal of Computer Applications 46(4), 10-17 (2012), Published by Foundation of Computer Science, New York, USA
2. Lecture Notes in Computer Science;A. Armando,2005
3. Blanchet, B.: Automatic proof of strong secrecy for security protocols. In: IEEE Symposium on Security and Privacy, Oakland, California, pp. 86–100 ( May 2004)
4. Lecture Notes in Computer Science;C.J.F. Cremers,2008
5. Lecture Notes in Computer Science;C.J.F. Cremers,2009