1. M. Abadi. Security protocols and their properties. In F. Bauer and R. Steinbrueggen, editors, Foundations of Secure Computation. IOS 2000.
2. M. Abadi and Jan Jürjens. Formal eavesdropping and its computational interpretation,2001. Submitted.
3. R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2001.
4. V. Apostolopoulos, V. Penis, and D. Saha. Transport layer security: How much does it really cost? In Conference on Computer Communications (IEEE Infocom), New York, March 1999.
5. N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In IEEE Symposium on Security and Privacy, 1998.