1. Mobile values, new names, and secure communication;Abadi,2001
2. Reconciling two views of cryptography (the computational soundness of formal encryption);Abadi,2000
3. Reconciling two views of cryptography (the computational soundness of formal encryption);Abadi;J. Cryptol.,2002
4. Cryptography and competition policy – issues with ‘trusted computing’;Anderson,2003
5. Cryptography and competition policy – issues with ‘trusted computing’;Anderson,2004