1. M. Abadi and R. M. Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering, 22(1):6–15, January 1996.
2. Lect Notes Comput Sci;R. J. Anderson,1997
3. G. Bella. Message Reception in the Inductive Approach. Research Report 460, University of Cambridge — Computer Laboratory, 1999.
4. Lect Notes Comput Sci;G. Bella,1999
5. G. Bella. Inductive Verification of Cryptographic Protocols. PhD thesis, University of Cambridge, Computer Laboratory, 2000. Research Report 493.