1. On the reachability problem in cryptographic primitives;Amadio,2000
2. David Basin, Sebastian Modersheim, and Luca Vigano. Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols. Technical Report TR-405, Swiss Federal Insititute of Technology, Zurich, May 2003
3. An optimal narrowing strategy for general canonical systems;Bockmayr,1992
4. Ahmed Bouajjani and Richard Mayr. Model checking lossy vector addition systems. In STACS, pages 323–333, 1999
5. Verification over Infinite States;Burkart,2001