1. M. Bond, R. Anderson, API level attacks on embedded systems, IEEE Comput. Mag. (2001) 67–75.
2. M. Bond, P. Zieliński, Decimalisation table attacks for PIN cracking, Technical Report UCAM-CL-TR-560, University of Cambridge, January 2003.
3. M. Carlsson, G. Ottosson, B. Carlson, An open-ended finite domain constraint solver, in: Proc. Programming Languages: Implementations, Logics, and Programs, Southampton, UK, September 1997, pp. 191–206.
4. J. Clulow, The design and analysis of cryptographic APIs for security devices, Master's Thesis, University of Natal, Durban, 2003.
5. P. Drielsma, S. Mödersheim, L. Viganò, A formalization of off-line guessing for security protocol analysis, in: F. Baader, A. Voronkov (Eds.), LPAR, Lecture Notes in Artificial Intelligence, Vol. 3452, ETH Zürich, Computer Science, Springer, Berlin, 2005, pp. 363–379.