1. R. Anderson and R.M. Needham. Programming Satan’s computer. In Computer Science Today, volume 1000 of Lecture Notes in Computer Science, pages 426–441. Springer, Berlin, Germany, 1995.
2. A. Baskar, R. Ramanujam, and S.P. Suresh. Knowledge-based modelling of voting protocols. In D. Samet, editor, Proceedings of the 11th Conference on Theoretical Aspects of Rationality and Knowledge, pages 62–71. Brussels, Belgium, June 25–27, 2007.
3. M. Burrows, M. Abadi, and R.M. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18–36, February 1990.
4. M. Cohen and M. Dam. A completeness result for BAN logic. In 2005 International Workshop on Methods for Modalities (M4M-05), pages 202–219. Berlin, Germany, December 1–2, 2005.
5. M. Cohen and M. Dam. A complete axiomatization of knowledge and cryptography. In 22nd IEEE Symposium on Logic in Computer Science (LICS 2007), pages 77–88. IEEE Computer Society, Wroclaw, Poland, 2007.