1. Abadi, M., Blanchet, B.: Secrecy types for asymmetric communication. Theoretical Computer Science 298(3), 387-415 (2003)
2. In: Honsell, F., Miculan, M. (eds.) FOSSACS 2001. LNCS, vol. 2030, pp. 25-41. Springer, Heidelberg (2001)
3. Backes, M., Maffei, M., Unruh, D.: Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. In: IEEE Symposium on Security and Privacy 2008, pp. 202–215 (2008)
4. Bruschi, D., Cavallaro, L., Lanzi, A., Monga, M.: Replay attack in TCG specification and solution. In: Proceedings of ACSAC 2005, Tucson, AZ (USA), vol. 10, pp. 127–137. ACSA, IEEE Computer Society (December 2005)
5. Lecture Notes in Computer Science;M. Centenaro,2012