1. Abadi, M. and Rogaway, P. (2000). Reconciling two views of cryptography (the computational soundness of formal encryption). In IFIP International Conference on Theoretical Computer Science (IFIP TCS2000), Sendai, Japan. Springer-Verlag, Berlin Germany.
2. Avispa (1999). The Avispa Project. http://www.avispa-project.org/.
3. Boisseau, A. (2003). Abstractions pour la vérification de propriétés de sécurité de protocoles cryptographiques. PhD thesis, Laboratoire Specification et Vérification (LSV), ENS de Cachan.
4. Bozga, L., Lakhnech, Y., and Périn, M. (2002). Abstract interpretation for secrecy using patterns. Technical report, EVA: http://www-eva.imag.fr/.
5. Clarke, E., Jha, S., and Marrero, W. (1998). Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In IFIP Working Conference on Programming Concepts and Methods.