1. Lecture Notes in Computer Science;R. Amadio,2002
2. Lecture Notes in Computer Science;A. Armando,2005
3. Lecture Notes in Computer Science;A. Armando,2002
4. Armando, A., Compagna, L.: An optimized intruder model for SAT-based model-checking of security protocols. In: Armando, A., Viganò, L. (eds.) ENTCS, vol. 125, pp. 91–108. Elsevier Science Publishers, Amsterdam (2005)
5. AVISPA Project. AVISPA protocol library,
http://www.avispa-project.org/