1. Abadi, M.: Security protocols and their properties. In: Bauer, F.L., Steinbrüggen, R. (eds.) Foundations of Secure Computation, pp. 39–60. IOS Press, Amsterdam (2000); 20th International Summer School, Marktoberdorf, Germany
2. Lecture Notes in Computer Science;M. Abadi,2001
3. Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, New York (2001)
4. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory IT-29(2), 198–208 (1983)
5. Lecture Notes in Computer Science;J. Grünbauer,2003