1. M. Backes, Cryptographically sound analysis of security protocols. Ph.D. thesis, Universität des Saarlandes, 2002. Online available at
http://www.infsec.cs.uni-sb.de/~backes/papers/PhDthesis.ps.gz
2. M. Backes, B. Pfitzmann, M. Waidner, A composable cryptographic library with nested operations, in 10th ACM Conference on Computer and Communications Security, Proceedings of CCS 2003 (ACM, New York, 2003), pp. 220–230. Extended abstract, extended version online available at
http://eprint.iacr.org/2003/015.ps
3. Lecture Notes in Computer Science;M. Backes,2004
4. M. Backes, B. Pfitzmann, M. Waidner, Secure asynchronous reactive systems. IACR ePrint Archive, March 2004. Online available at
http://eprint.iacr.org/2004/082.ps
5. R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in 42th Annual Symposium on Foundations of Computer Science, Proceedings of FOCS 2001 (IEEE Comput. Soc., Los Alamitos, 2001), pp. 136–145. Full version online available at
http://www.eccc.uni-trier.de/eccc-reports/2001/TR01-016/revisn01.ps