[1] Michael Burrows, Martín Abadi, and Roger Needham. A Logic of Authentication. Proceedings of the Royal Society of London. Series A, Mathematical and Physical Sciences (1934-1990), 426(1871):233-271, 1989.
[2] Martín Abadi and Mark R. Tuttle. A Semantics for a Logic of Authentication (Extended Abstract). In Proceedings of the ACM Symposium of Principles of Distributed Computing, pages 201-216. ACM Press, 1991.
[3] Paul van Oorschot. Extending Cryptographic Logics of Belief to Key Agreement Protocols. In Proceedings of the 1st ACM conference on Computer and Communications Security (CCS '93), pages 232-243, New York, NY, USA, 1993. ACM.
[4] Paul F. Syverson and Paul C. van Oorschot. On Unifying Some Cryptographic Protocol Logics. In Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy (CSFW94), pages 14-28, 1994.
[5] Li Gong, Roger Needham, and Raphael Yahalom. Reasoning about Belief in Cryptographic Protocols. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, 1990.
[6] Yan Zhang and Vijay Varadharajan. A Logic for Modeling the Dynamics of Beliefs in Cryptographic Protocols. In Proceedings of the 24th Australaian Conference on Computer Science, pages 215-222. IEEE Computer Society Washington, DC, USA, 2001.
[7] Gavin Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR. In Proceedings of Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055, pages 147-166. Springer, 1996.
[8] A. William Roscoe. Modeling and Verifying Key- Exchange Protocols using CSP and FDR. In Proceedings of the 8th IEEE Computer Security Foundations Workshop, pages 98-107, 1995.
[9] Peter Ryan, Steve Schneider, Michael Goldsmith, Gavin Lowe, and Bill Roscoe. The Modeling and Analysis of Security Protocols: the CSP Approach. Addison-Wesley, 2001.
[10] F. Javier Thayer F_abrega, Jonathan C. Herzog, and Joshua D. Guttman. Strand Spaces: Why is a Security Protocol Correct? In Proceedings of the IEEE Symposium on Security and Privacy, pages 160-171, 1998.
[11] F. Javier Thayer F_abrega, Jonathan C. Herzog, and Joshua D. Guttman. Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security, 7(2-3):191-230, 1999.
[12] Wan Fokkink. Introduction to Process Algebra. Texts in Theoretical Computer Science. An EATCS Series. Springer, 2000.
[13] Wan Fokkink. Modeling Distributed Systems. Texts in Theoretical Computer Science. An EATCS Series. Springer, 2007.
[14] Gavin Lowe. A Hierarchy of Authentication Speci_cations. In Proceedings of 10th IEEE Computer Security Foundations Workshop, volume 15. IEEE, 1997.
[15] Gavin Lowe. A Family of Attacks upon Authentication Protocols. Technical Report 1997/5, Department of Mathematics and Computer Science, University of Leicester, England, 1997.
[16] Rasool Ramezanian. Authentication in Parallel Multiple- Sessions Execution of Protocols. In Proceedings of the 4th Iranian Society of Cryptology Conference, 2007.
[17] C.A. Middelburg and Michel A. Reniers. Introduction to Process Theory, 2004. Technische Universiteit Eindhoven.
[18] Stefan Blom, Jan Friso Groote, Sjouke Mauw, and Alexander Serebrenik. Analysing the BKE-security Protocol with ϻCRL. Electronic Notes in Theoretical Computer Science, 139(1):49-90, 2005.
[19] Cas J. F. Cremers, Sjouke Mauw, and Erik P. de Vink. A Syntactic Criterion for Injectivity of Authentication Protocols. Electronic Notes in Theoretical Computer Science, 135(1):23-38, 2005. Proceedings of the Second Workshop on Automated Reasoning for Security Protocol analysis (ARSPA 2005).
[20] Cas J. F. Cremers, Sjouke Mauw, and Erik P. de Vink. Injective Synchronisation: An Extension of the Authentication Hierarchy. Theoretical Computer Science, 367(1-2):139-161, 2006. Automated Reasoning for Security Protocol Analysis, Automated Reasoning for Security Protocol Analysis.
[21] Mohammad Torabi Dashti. Keeping Fairness Alive: Design and Formal Verification of Fair Exchange Protocols. PhD thesis, Vrije Universitei, Amsterdam, 2008.
[22] Riccardo Focardi and Roberto Gorrieri. A Classi_cation of Security Properties for Process Algebras. Journal of Computer Security, 3:5-33, 1994.
[23] Jun Pang. Analysis of a Security Protocol in ϻCRL. In Proceedings of the 4th International Conference on Formal Engineering Methods (ICFEM): Formal Methods and Software Engineering, pages 396-400. Springer, 2002.
[24] Thomas Y.C. Woo and Simon S. Lam. A Semantic Model for Authentication Protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pages 178-194, 1993.
[25] Andrew D. Gordon and Alan Jeffrey. Authenticity by Typing for Security Protocols. In Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW'01), pages 145-159, Los Alamitos, CA, USA, 2001. IEEE Computer Society.
[26] Andrew D. Gordon and Alan Jeffrey. Typing Correspondence Assertions for Communication Protocols. Theoretical Computer Science, 300(1-3):379-409, 2003.
[27] Eduardo Bonelli, Adriana Compagnoni, and Elsa Gunter. Correspondence Assertions for Process Synchronization in Concurrent Communications. Journal of Functional Programming, 15(02):219-247, 2005.
[28] Annette M. Bleeker and Jan van Eijck. The Epistemics of Encryption. Technical report, CWI (Centre for Mathematics and Computer Science), Amsterdam, The Netherlands, 2000.
[29] Francien Dechesne and Yanjing Wang. Dynamic Epistemic Verification of Security Protocols: Framework and Case Study. In Proceedings of the Workshop on Logic, Rationality and Interaction, pages 129-144, 2007.
[30] Jan van Eijck and Simona Orzan. Epistemic Veri_cation of Anonymity. Electronic Notes in Theoretical Computer Science, 168:159-174, 2007. Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA 2006).
[31] Hans van Ditmarsch, Wiebe van der Hoek, and Barteld Kooi. Dynamic Epistemic Logic, volume 337 of Synthese Library. Springer, 2007.
[32] Ronald Fagin, Joseph Y. Halpern, Yoram Moses, and Moshe Y. Vardi. Reasoning about Knowledge. MIT Press, Cambridge MA, August 1995.