1. On the reachability problem in cryptographic protocols;Amadio,2000
2. Bounding messages for free in security protocols;Arapinis,2007
3. SATMC: a SAT-based model checker for security-critical systems;Armando,2014
4. Resolution of constraint systems for automatic composition of security-aware Web services;Avanesov,2011
5. Satisfiability of general intruder constraints with a set constructor;Avanesov,2010