1. M. Burrows, M. Abadi, R. Needham, A Logic of Authentication, Technical Report 39, Digital Systems Research Center (February 1989).
2. Three systems for cryptographic protocol analysis;Kemmerer;Journal of Cryptology,1994
3. E. Snekkenes, Formal Specification and Analysis of Cryptographic Protocols, PhD thesis, Faculty of Mathematics and Natural Sciences, University of Oslo, Norwegian Defence Research Establishment, P.O. Box 25, N-2007, Kjeller, Norway, January 1995.
4. Deciding cryptographic protocol adequacy with HOL: the implementation;Brackin,1996
5. S. Brackin, Empirical Tests of the Automatic Authentication Protocol Analyser, 2nd Version (AAPA2), Technical Report 99006, Arca Systems, Exodus Communications, October 1999.