A Calculus for Cryptographic Protocols: The Spi Calculus : M. Abadi, A. Gordon.1997 ACM Conference on Computer and Communications Security, pp. 36-47.
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption): M. Abadi, P. Rogaway2002Journal Cryptology, 15(2), pp. 103-127
Formal Methods for the Analysis of Security Protocols: Pedro Adão - Supervised by P. Mateus and A. Scedrov2006PhD thesis, IST, Universidade Técnica de Lisboa.
On the Security of Public Key Protocols: D. Dolev, and A. Yao1983IEEE Transactions on Information Theory, vol. IT-29(2), pp. 198-208
Multiset rewriting and the complexity of bounded security protocols: N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov2004Journal of Computer Security, 12(2), 247-311
The faithfulness of abstract protocol analysis: message authentication: J. Guttman, F. Thayer, and L. Zuck2001ACM Conference on Computer and Communications Security, pp. 186-195
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR, Software: G. Lowe1996Concepts and Tools 17(3), pp. 93-102.
Formal Methods for Cryptographic Protocol Analysis: Emerging Issues: C. Meadows2003IEEE Journal on Selected Areas in Communications 21(1), pp. 44-54.