1. Analyzing security protocols with secrecy types and logic programs;Abadi;Journal of the ACM,2005
2. Certified email with a light on-line trusted third party: Design and implementation;Abadi,2002
3. Verifying second-level security protocols;Bella,2003
4. The verification of an industrial payment protocol: The SET purchase phase;Bella,2002
5. G. Bella, L.C. Paulson, Using Isabelle to prove properties of the Kerberos authentication system, in: DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997, Piscataway, NJ, 1997