Bibliografia
Principal
- Modal Logic:
P. Blackburn, M. de Rijke, and Y. Venema
2001
Cambridge University Press
- Reasoning about Knowledge:
R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi
1995
The MIT Press
- On the Security of Public Key Protocols:
D. Dolev, and A. Yao
1983
IEEE Transactions on Information Theory, vol. IT-29(2), pp. 198-208.
- A Logic of Authentication:
M. Burrows, M. Abadi, and R. Needham
1990
ACM Transactions on Computer Systems 8(1), pp. 18-36
Secundária
- Metareasoning about security protocols using distributed temporal logic:
C. Caleiro, L. Viganò, and D. Basin
2005
Electronic Notes in Theoretical Computer Science, 125(1):67-89
- A compositional logic for proving security properties of protocols:
N.A. Durgin, J.C. Mitchell, D. Pavlovic
2003
Journal of Computer Security, 11(4), pp. 677-721
- Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR:
G. Lowe
1996
Software - Concepts and Tools 17(3), pp. 93-102.
- Strand Spaces: Proving Security Protocols Correct:
F. Thayer, J. Herzog, and J. Guttman
1999
Journal of Computer Security, 7(1)