1. Abadi M, Gordon A D (1999) A calculus for cryptographic protocols: The Spi-Calculus. Information and Computation 148(1): 1–70.
2. Aziz B, Gray D, Hamilton G, Oehil F, Power J, Sinclair D (2001) Implementing protocol verification for E-commerce. In: Proceedings of the 2001 International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet (SSGRR 2001), L’Aquila, Italy.
3. Boreale, M (2001) Symbolic trace analysis of cryptographic protocols. In: Proceedings of ICALP’01, Lecture Notes in Computer Science, vol. 2076, Springer, Berlin.
4. Boreale M, Buscemi M (2002) Experimenting with STA, a tool for automatic analysis of security protocols. ACM Symposium on Applied Computing 2002, ACM Press.
5. Boreale M, Gorla D (2002) Process calculi and the verification of security protocols. In: Journal of Telecommunications and Information Technology – Special Issue on Cryptographic Protocol Verification JTIT, Warsaw, Poland.