1. Bella, G.: Message reception in the inductive approach. Research Report 460, University of Cambridge – Computer Laboratory (1999)
2. Lecture Notes in Computer Science;G. Bella,2000
3. Lecture Notes in Computer Science;G. Bella,1998
4. Brackin, S.: Automatic formal analyses of two large commercial protocols. In: Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols (September 1997), Available on the web at
http://www.arca.com/proj_papers/brackin/dimacs.pdf
5. Brackin, S.: Automatically detecting authentication limitations in commercial security protocols. In: Proceedings of the 22nd National Conference on Information Systems Security (October 1999), Available on the web at
http://www.arca.com/proj_papers/brackin/Nissc99.pdf