1. M. Abadi and M. Tuttle. A Semantics for a Logic of Authentication, to appear in Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, Montreal, August 1991.
2. M. Burrows, M. Abadi, and R.M. Needham. A Logic of Authentication, Proceedings of the Royal Society of London A Vol. 426, 1989, pp. 233–271. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989.
3. CCITT. CCITT Blue Book, Recommendation X.509 and ISO 9594-8: The Directory-Authentication Framework. Geneva, March 1988.
4. D. Chaum and I. Schaumüller-Bichl, editors. Smart Card 2000: The Future of IC Cards, Proceedings of the IFIP WG 11.6 International Conference on Smart Card 2000: The Future of IC Cards, Laxenburg, Austria, October, 1987. North-Holland, Amsterdam, 1989.
5. National Bureau of Standards. Data Encryption Standard. Fed. Inform. Processing Standards Pub. 46. Washington DC, January 1977.