1. Authentication and delegation with smart-cards;Abadi;Sci. Comput. Programming,1993
2. A semantics for a logic of authentication;Abadi,1991
3. Modal specifications of trace-based security properties;Accorsi,2002
4. A new logic for electronic commerce protocols;Adi;Theoret. Comput. Sci.,2003
5. R. Anderson, R.M. Needham, Programming Satan's computer, in: Computer Science Today, Lecture Notes in Computer Science, Vol. 1000, 1995, pp. 426–441.