1. Lect Notes Comput Sci;R. Anderson,1995
2. Michael Burrows, Martin Abadi, and Roger Needham. A logic of authentication. ACM Transactions in Computer Systems, 8(1):18–36, 1990.
3. John Clark and Jeremy Jacob. A survey of authentication protocol literature: Version 1.0. Available at the URL http://www.cs.york.ac.uk/~jac/> .
4. G. Denker, J. Meseguer, and C. Talcott. Protocol specification and analysis in Maude. In N. Heintze and J. Wing, editors Proceedings of the Workshop on Formal Methods and Security Protocols, pages 939–944, Indianapolis, Indiana, June 1998.
5. D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29:198–208, 1983.