1. Tanenbaum, A.: Computer Networks, 4th edn. Prentice Hall Professional Technical Reference (2002)
2. Shigong, L., Lijun, W.: Analysis of cryptographic protocols using ltl of knowledge. In: 2010 2nd International Conference on Networking and Digital Society (ICNDS), vol. 1, pp. 463–466 (2010)
3. Daws, C., Kwiatkowska, M., Norman, G.: Automatic verification of the ieee 1394 root contention protocol with kronos and prism. International Journal on Software Tools for Technology Transfer 5(2-3), 221–236 (2004)
4. Ma, J., Zhang, D., Xu, G., Yang, Y.: Model checking based security policy verification and validation. In: 2010 2nd International Workshop on Intelligent Systems and Applications (ISA), pp. 1–4 (2010)
5. Glabbeek, R.J.V., Smolka, S.A., Steffen, B.: Reactive, generative and stratified models of probabilistic processes. Information and Computation 121, 130–141 (1990)