1. On the security of public key protocols;Dolev,1981
2. A computationally sound mechanized prover for security protocols;Blanchet,2006
3. Reconciling two views of cryptography (the computational soundness of formal encryption);Abadi,2000
4. A survey of symbolic methods in computational analysis of cryptographic systems;Cortier;J. Autom. Reason.,2011
5. Towards unconditional soundness: computationally complete symbolic attacker;Bana,2012