1. Verification of cryptographic protocols: Tagging enforces termination;Blanchet,2003
2. Searching for shapes in cryptographic protocols;Doghmi,2007
3. Security goals: Packet trajectories and strand spaces;Guttman,2001
4. Authentication tests and the structure of bundles;Guttman;Theoretical Computer Science,2002
5. The faithfulness of abstract protocol analysis: Message authentication;Guttman;Journal of Computer Security,2004