1. Scerri G (2015) Proofs of security protocols revisited. Doctoral dissertation, Ecole Normale Supérieure de Cachan
2. Alia MA, Tamimi AA, AL-Allaf ON (2014) Cryptography based authentication methods. In: Proceedings of the world congress on engineering and computer science (Vol 1)
3. Jinyue X, Jiandong W, Liming F, Yongjun R, Shizhu B (2007) Formal proof of relative strengths of security between ECK2007 model and other proof models for key agreement protocols
4. Kala DK, Sharma V (2009) Public key encryption algorithm and the random oracle
5. Boyd C, Choo KKR, Mathuria A (2006) An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys. In: Australasian conference on information security and privacy. Springer, Berlin, Heidelberg, pp 371–382