1. A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Héam, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, L. Vigneron, The AVISPA tool for the automated validation of internet security protocols and applications, in: CAV’05, 2005, pp. 281–285.
2. G. Denker, J. Millen, CAPSL intermediate language, in: Formal Methods and Security Protocols, 1999, pp. 1–10.
3. Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols;Meseguer;Journal of Higher-Order and Symbolic Computation,2005
4. The inductive approach to verifying cryptographic protocols;Paulson;Journal of Computer Security,1998
5. A comparison between strand spaces and multiset rewriting for security protocol analysis;Cervesato,2003