1. A logic of authentication;Abadi;ACM Transactions on Computer Systems,1990
2. Reasoning about cryptographic protocols in the spi calculus;Abadi,1997
3. A bisimulation method for cryptographic protocols;Abadi;Nordic Journal of Computing,1998
4. Static analysis for the π-calculus with applications to security;Bodei;Information and Computation,2001
5. Proof techniques for cryptographic processes;Boreale;Logic in Computer Science,1999