1. Yang Liu, Jun Sun, and Jin Song Dong. 2010. Developing model checkers using PAT. In ATVA. 371–377.
2. Third Generation Partnership Project (3GPP). 2000. 3G Security: Formal Analysis of the 3G Authentication Protocol. Technical Report TS 33.902 v3.1.0.
3. Mahdi Aiash. 2013. A formally verified initial authentication and key agreement protocol in heterogeneous environments using Casper/FDR. In Network and System Security - 7th International Conference (NSS’13). Proceedings (Lecture Notes in Computer Science), Javier López, Xinyi Huang, and Ravi S. Sandhu (Eds.), Vol. 7873. Springer, 742–748.
4. Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful Jahari Hashim, and Borhanuddin M. Ali. 2014. An efficient authentication and key agreement protocol for 4G (LTE) networks. In 2014 IEEE REGION 10 SYMPOSIUM.
5. Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan, Nico Golde, Kevin Redon, and Ravishankar Borgaonkar. 2012. New privacy issues in mobile telephony: Fix and verification. In the ACM Conference on Computer and Communications Security (CCS’12), Ting Yu, George Danezis, and Virgil D. Gligor (Eds.). ACM, 205–216.