1. AbsInt. aicall (2004),
http://www.aicall.de/
2. Broy, M., Jürjens, J., Cengarle, V., Rumpe, B.: Towards a system model for UML. Technical report, TU Munich (2005)
3. Braun, P., Marschall, F.: The BOTL tool (2003),
http://www4.in.tum.de/~marschal/botl/index.htm
4. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory IT-29(2), 198–208 (1983)
5. Lecture Notes in Computer Science;T. Elrad,2002