1. M. Burrows, M. Abadi and R. Needham, “A logic of Authentication”, Report 39, Digital Systems Research Center, Palo Alto, Ca.
2. D. Chaum, “Achieving Electronic Privacy”, in Scientific American, 267 no 2, August 1992, pp 76–81
3. Y. Desmedt and J.-J. Quisquater, "Public-key Systems Based on the Difficulty of Tampering', in Advances in Cryptology — CRYPTO 86, Springer Lecture Notes in Computer Science 263 pp 111–117
4. L. Gong, Cryptographic Protocols for Distributed Systems (PhD Thesis), University of Cambridge 1990.
5. V. D. Gligor, R. Kailar, S. Stubblebine and L. Gong, “Logics for Cryptographic Protocols — Virtues and Limitations”, in Proceedings, Computer Security Foundations Workshop IV, IEEE 1991, pp 219–226