1. M. Burrows, M. Abadi, and R. Needham. Authentication: A Practical Study in Belief and Action. Technical Report 138, University of Cambridge Computer Laboratory, 1988.
2. M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. Technical Report 39, Digital Systems Research Center, 1989.
3. M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1): 18–36, February 1990.
4. CCITT. CCITT Blue Book, Recommendation X.509 and ISO 9594-8, Information Processing Systems—Open Systems Interconnection—The Directory—Authentication Framework. Geneva, March 1988.
5. D. Coppersmith. Analysis of ISO/CCITT Document X.509 Annex D. IBM Thomas J. Watson Research Center, Yorktown Heights, June 1989.