1. Subtyping dependent types;Aspinall,1996
2. Typed multiset rewriting specifications of security protocols;Cervesato,2000
3. Typed MSR: syntax and examples;Cervesato,2001
4. Security without identification: transaction systems to make big brother obsolete;Chaum;Communications of the Association for Computing Machinery,1985
5. On the security of public key protocols;Dolev;IEEE Transactions on Information Theory,1983