1. Just Fast Keying in the Pi Calculus;Abadi,2004
2. Reconstruction of Attacks against Cryptographic Protocols;Allamigeon,2005
3. The AVISS Security Protocol Analysis Tool;Armando,2002
4. Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning;Armando,2002
5. Abstraction-driven SAT-based Analysis of Security Protocols;Armando,2003