1. R. Amadio, D. Lugiez, On the reachability problem in cryptographic protocols, in: Proc. CONCUR 2000, Lecture Notes in Computer Science, Vol. 1877, Springer, Berlin, 2000.
2. Lazy infinite-state analysis of security protocols;Basin,1999
3. Towards the formal verification of electronic commerce protocols;Bolignano,1997
4. A meta-notation for protocol analysis;Cervesato,1999
5. Y. Chevalier, L. Vigneron, Towards efficient automated verification of security protocols, in: Verification Workshop (VERIFY’01) (in connection with IJCAR’01), Siena, Italy, June 2001.