1. Bao F, Deng R.: An efficient fair exchange protocol with an off-line semi-trusted third party. In: Proceedings of international workshop on cryptographic techniques and E-commerce, 3747, 1999.
2. Burrows M., Abadi M., Needham R., A Logic of Authentication Robert Harper. Logics and Languages for Security, 15819, 2007.
3. Time based expressivity of time Petri nets for system specification;Cerone;Theoretical Computer Science,1999
4. Towards practical public key systems secure against chosen ciphertext attacks Crypto;Damgard;Lecture Notes in Computer Science,1992
5. Franklin M, Reiter M.: Fair exchange with a semi-trusted third party. In: Proceedings of ACM conference on computer and communications security, Zurich, Switzerland, 15, 1997.