1. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptol. 15(2), 103–127 (2002)
2. Abadi, M., Tuttle, M.R.: A semantics for a logic of authentication. In: Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing, pp. 201–216 (1991)
3. Becker, M.Y., Russo, A., Sultana, N.: Foundations of logic-based trust management. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 161–175 (2012)
4. Belardinelli, F., Lomuscio, A: Interactions between time and knowledge in a first-order logic for multi-agent systems. In: Proceedings of the 12th International Conference on the Principles of Knowledge Representation and Reasoning, pp. 38–48 (2010)
5. Bonakdarpour, B., Hajisheykhi, R., Kulkarni, S.S.: Knowledge-based automated repair of authentication protocols. In: Proceedings of the 19th International Symposium on Formal Methods, pp. 132–147 (2014)