1. Validating security protocols under the general attacker;Arsac,2009
2. A practical and provably secure coalition-resistant group signature scheme;Ateniese,2000
3. Official 12dicts package;Atkinson,2011
4. Accountability protocols: formalized and verified;Bella;ACM Transactions on Information and System Security,2006
5. Retaliation: can we live with flaws?;Bella,2005