1. Alabdulatif A, Ma X, Nolle L (2012) A framework for cryptographic protocol analysis using linear temporal logic. In: International conference on information society, pp 525–530
2. Jurcut A, Coffey T, Dojen R (2017) A novel security protocol attack detection logic with unique fault discovery capability for freshness attacks and interleaving session attacks. IEEE Trans Dependable Secure Comput 99:1
3. Hess AV, Modersheim S (2017) Formalizing and proving a typing result for security protocols in isabelle/hol. In: Computer security foundations symposium, pp 451–463
4. He D, Chen C, Chan S, Bu J, Yang LT (2013) Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 60(11):5348–5354
5. Cohn-Gordon K, Cremers C, Dowling B, Garratt L, Stebila D (2017) A formal security analysis of the signal messaging protocol. In: IEEE European symposium on security and privacy (EuroS&P). IEEE, pp 451–466