1. Lecture Notes in Computer Science;B. Adida,2009
2. Barisani, A., Bianco, D., Laurie, A., Franken, Z.: Chip & PIN is definitely broken. Presentation at CanSecWest Applied Security Conference, Vancouver (2011), slides
http://dev.inversepath.com/download/emv/emv_2011.pdf
3. Bhargavan, K., Fournet, C., Gordon, A.: Modular verification of security protocol code by typing. ACM SIGPLAN Notices 45(1), 445–456 (2010)
4. Bhargavan, K., Fournet, C., Tse, S.: Verified interoperable implementations of security protocols. In: Computer Security Foundations Workshop (CSFW), pp. 139–152. IEEE, Los Alamitos (2006)
5. Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Computer Security Foundations Workshop (CSFW), pp. 82–96. IEEE, Los Alamitos (2001)