References
1. D. Dolev and A. C. Yao, “On the security of public key protocols”, IEEE Transactions on
Information Theory, 29(2), March 1983, pp. 198-208
2. C. A. R Hoare, Communicating Sequential Processes, Prentice-Hall International, 1985
3. L. Gong, R. Needham and R. Yahalom, “Reasoning about Belief in Cryptographic Proto-
cols”, In IEEE Symposium on Research in Security and Privacy, IEEE Computer Society
Press, May 1990, pp. 234–248
4. A. D. Gordon and A. Jeffrey, “Authenticity by typing for security protocols” In 14th IEEE
Computer Security Foundations Workshop, 2001, pp. 145-159
5. G. Lowe, “Breaking and Fixing the Needham-Schroeder public-key protocol using FDR”,
Proceedings of TACAS, LNCS 1055, 1996, Springer-Verlag, pp. 147-166
6. C. Meadows “The NRL Protocol Analyzer: An overview”, Journal of Logic Programming,
26(2), 1996, pp. 113-131
7. J. C. Mitchell, M. Mitchell and U. Stern, “Automated analysis of cryptographic protocols
using Murϕ”, In IEEE Symposium on Security and Privacy, IEEE Computer Society Press,
1997, pp. 141-151
8. P. Ryan, S. Schneider, M. Goldsmith, G. Lowe and B. Roscoe, B. Modelling and Analysis
of Security Protocols. Addison-Wesley, 2001
9. S. Schneider, “Security Properties and CSP”, In IEEE Symposium Research in Security and
Privacy, Oakland, IEEE Computer Society Press, 1996
10. S. Schneider, “Verifying Authentication Protocols in CSP”, IEEE Transactions on Soft-
ware Engineering, Volume 24, No. 9, IEEE Computer Society Press, September 1998, pp.
741-758
11. P. F. Syverson and P. C. van Oorschot, “On unifying some cryptographic protocol logics”,
In IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press,
May 1994, pp. 14-28
12. F. J. Thayer Fábrega, J. C. Herzog and J. D. Guttman, “Strand spaces: Why is a security
protocol correct?”, In IEEE Symposium Research in Security and Privacy, IEEE Computer
Society Press, May 1998, pp. 24-34
13. T.Y.C. Woo and S. S. Lam, “Authentication for Distributed Systems”, Computer, 25(1),
January 1992, pp. 39-52
14. T.Y.C. Woo and S. S. Lam, “A lesson on Authenticated Protocol design”, Operating Sys-
tems Review, 28(3), 1994, pp. 24-37
12