1. A calculus for cryptographic protocols: the spi calculus;Abadi;Inf. Comput.,1999
2. J. Alves-Foss, Provably insecure mutual authentication protocols: the two-party symmetric encryption case, in: Proceedings of National Information System Security Conference, October 1999, pp. 306–314.
3. Proving authentication properties in the Protocol Derivation Assistant;Anlauff,2006
4. The AVISPA tool for the automated validation of internet security protocols and applications;Armando,2005
5. Compositional analysis of contract-signing protocols;Backes;Theor. Comput. Sci.,2006