1. M. Abadi, V. Cortier, Deciding knowledge in security protocols under equational theories, in: Proc. 31st Internat. Coll. Automata, Languages, and Programming (ICALP’04), Lecture Notes in Computer Science, Vol. 3142, Springer, Berlin, July 2004, pp. 46–58.
2. Deciding knowledge in security protocols under (many more) equational theories;Abadi,2005
3. M. Abadi, C. Fournet, Mobile values, new names, and secure communication, in: Proc. 28th ACM Symp. on Principles of Programming Languages (POPL’01), January 2001, pp. 104–115.
4. A bisimulation method for cryptographic protocols;Abadi;Nordic J. Comput.,1998
5. A calculus for cryptographic protocols: the spi calculus;Abadi;Inform. Comput.,1999