1. Mobile values, new names, and secure communication;Abadi,2001
2. A calculus for cryptographic protocols: the spi calculus;Abadi,1997
3. Provable security of on-demand distance vector routing in wireless ad hoc networks;Ács,2005
4. Modelling adversaries and security objectives for routing protocols in wireless sensor networks;Ács,2006
5. On the symbolic reduction of processes with cryptographic functions;Amadio;Theor. Comput. Sci.,2002