1. Prudent engineering practice for cryptographic protocols;Abadi;IEEE Transactions on Software Engineering,1996
2. Explicit communication Revisited: two new attacks on authentication protocols;Abadi;IEEE Transactions on Software Engineering,1997
3. An efficient and secure ID-based remote user authentication scheme using smart card;Ahirwal;International Journal of Applied Information Systems (IJAIS),2012
4. Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005;Altaf,2008
5. Robustness principles for public key protocols;Anderson,1995