1. M. Abadi, M. Burrows, and R. Needham. A Logic of Authentication. In Proceedings of the Royal Society, Series A, 426, 1871, pages 233–271, December 1989.
2. M. Abadi and R. Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering, 22(1):6–15, January 1996.
3. J.P. Beckmann, P. De Goede, and A.C.M. Hutchison. SPEAR: Security Protocol Engineering and Analysis Resources. In DIMACS Workshop on Design and Formal Verification of Security Protocols. Rutgers University, September 1997.
4. J. Clark and J. Jacob. A Survey of Authentication Protocol Literature: Version 1.0, November 1997.
5. V.D. Gligor, L. Gong, R. Kailar, and S. Stubblebine. Logics for Cryptographic Protocols-Virtues and Limitations. In Proceedings of the Fourth IEEE Computer Security Foundations Workshop, pages 219–226, Franconia, New Hampshire, October 1991. IEEE Computer Society Press.