1. Abadi, M. and Gordon, A.: A calculus for cryptographic protocols: the spi calculus. Information and Computation, 148,1, (1999) 1–70
2. Abadi, M. and Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. Research Report 125, Digital Equipment Corp., System Research Center, (1994)
3. Aspinall, D. and Compagnoni, A.: Subtyping Dependent Types. In E.N. Clarke, editor, Proc. LICS’96. New Brunswick, NJ. IEEE Computer Society Press (1996) 86–97
4. Balenson, D., McGrew, D. and Sherman, A.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. Internet Draft (work in progres), draft-irtf-smug-groupkeymgmt-oft-00.txt, Internet Engineering Task Force (August 25, 2000)
5. Burrows, M., Abadi, M. and Needham, R.: A Logic of Authentication. Proceedings of the Royal Society, Series A, 426,1871 (1989) 233–271