1. On the reachability problem in cryptographic protocols;Amadio,2000
2. On the symbolic reduction of processes with cryptographic functions;Amadio;Theor. Comput. Sci.,2003
3. From one session to many: dynamic tags for security protocols;Arapinis,2008
4. Bounding messages for free in security protocols;Arapinis,2007
5. Gamma and the chemical reaction model: ten years after;Banâtre,1996