1. Lecture Notes in Computer Science;G. Bella,2001
2. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. Journal of Computer Security, 347–390 (2005)
3. Braghin, C., Cortesi, A., Focardi, R.: Information flow security in boundary ambients. Inf. Comput. 206(2-4), 460–489 (2008)
4. Brusò, M., Cortesi, A.: Non-repudiation analysis using LYSA with annotations, CS Tech. Report, Univ. Ca Foscari. Tech. rep. (2008), http://www.unive.it/nqcontent.cfm?a_id=5144#rapporti08
5. Buchholtz, M., Lyngby, K.: Automated analysis of security in networking systems. Ph. d. thesis proposal, Tech. rep. (2004), http://www.imm.dtu.dk/~mib/thesis