1. Andova, S., Cremers, C.J.F., Gjøsteen, K., Mauw, S., Mjølsnes, S.F., Radomirović, S.: Sufficient conditions for composing security protocols. Information and Computation (2007)
2. Backes, M., Cortesi, A., Focardi, R., Maffei, M.: A calculus of challenges and responses. In: FMSE 2007: ACM Workshop on Formal Methods in Security Engineering, pp. 51–60. ACM, New York (2007)
3. Backes, M., Pfitzmann, B., Waidner, M.: A universally composable cryptographic library (2003),
http://eprint.iacr.org/2003/015/
4. Bhargavan, K., Corin, R., Deniélou, P.-M., Fournet, C., Leifer, J.J.: Cryptographic protocol synthesis and verification for multiparty sessions. In: IEEE Computer Security Foundations Symposium (2009)
5. Bird, R., Gopal, I., Herzberg, A., Janson, P.A., Kutten, S., Mulva, R., Yung, M.: Systematic design of a family of attack-resistant authentication protocols. IEEE Journal on Selected Areas in Communications 11(5), 679–693 (1993)