1. Weakness in the Helsinki protocol
2. ISO/IEC 2nd DIS 11770-3: ‘Key management-Part 3: Mechanisms using asymmetric techniques’. International Organization for Standardization, 1997
3. ‘Towards a completeness result for model checking of security protocols’, Technical Report, 1998/6, University of Leicester Department of Mathematics and Computer Science, 1998 Available from http://www.mcs.le.ac.uk/~glowe/Security/Papers/completeness.ps.gz