1. Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 367(1-2), 2–32 (2006)
2. Lecture Notes in Computer Science;T. Avanesov,2012
3. Avanesov, T., Chevalier, Y., Rusinowitch, M., Turuani, M.: Satisfiability of general intruder constraints with and without a set constructor. CoRR, abs/1103.0220 (2011)
4. Avanesov, T., Chevalier, Y., Rusinowitch, M., Turuani, M.: Intruder deducibility constraints with negation. Decidability and application to secured service compositions. INRIA Research Report (July 2012),
http://hal.inria.fr/hal-00719011
5. Automated Validation of Trust and Security of Service-Oriented Architectures, AVANTSSAR project,
http://www.avantssar.eu