1. Dolev, D., Yao, A., On the security of public key protocols, IEEE Transactions on Information Theory, 1983, 29(2): 198–208.
2. Huai Jinpeng, Li Xianxian, Algebra model and security analysis for cryptographic protocols, Science in China, Series F, 2004, 47(2): 199–220.
3. Comon, H., Shmatikov, V., Is it possible to decide whether a cryptographic protocol is secure or not? Journal of Telecommunications and Information Technology, 2002, (4): 5–15.
4. Lowe, G., Breaking and fixing the Needham-Schroeder public-key protocols using FDR, In Lecture Notes in Computer Science, Vol. 1055, Berlin: Springer-Verlag, 1996, 147–166.
5. Mitchell, J. C., Mitchell, M., Stern, U., Automated analysis of cryptographic protocols using murφ, in Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1997.