
References 
1.  D. Dolev and A. C. Yao, “On the security of public key protocols”, IEEE Transactions on 
Information Theory, 29(2), March 1983, pp. 198-208 
2.  C. A. R Hoare, Communicating Sequential Processes, Prentice-Hall International, 1985 
3.  L. Gong, R. Needham and R. Yahalom, “Reasoning about Belief in Cryptographic Proto-
cols”, In IEEE Symposium on Research in Security and Privacy, IEEE Computer Society 
Press, May 1990, pp. 234–248 
4.  A. D. Gordon and A. Jeffrey, “Authenticity by typing for security protocols” In 14th IEEE 
Computer Security Foundations Workshop, 2001, pp. 145-159 
5.  G. Lowe, “Breaking and Fixing the Needham-Schroeder public-key protocol using FDR”, 
Proceedings of TACAS, LNCS 1055, 1996, Springer-Verlag, pp. 147-166  
6.  C. Meadows “The NRL Protocol Analyzer: An overview”, Journal of Logic Programming, 
26(2), 1996, pp. 113-131 
7.  J. C. Mitchell, M. Mitchell and U. Stern, “Automated analysis of cryptographic protocols 
using Murϕ”, In IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 
1997, pp. 141-151 
8.  P. Ryan, S. Schneider, M. Goldsmith, G. Lowe and B. Roscoe, B. Modelling and Analysis 
of Security Protocols. Addison-Wesley, 2001 
9.  S. Schneider, “Security Properties and CSP”, In IEEE Symposium Research in Security and 
Privacy, Oakland, IEEE Computer Society Press, 1996 
10. S. Schneider, “Verifying Authentication Protocols in CSP”, IEEE Transactions on Soft-
ware Engineering,  Volume 24, No. 9, IEEE Computer Society Press, September 1998, pp. 
741-758 
11. P. F. Syverson and P. C. van Oorschot, “On unifying some cryptographic protocol logics”, 
In IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, 
May 1994, pp. 14-28 
12. F. J. Thayer Fábrega, J. C. Herzog and J. D. Guttman, “Strand spaces: Why is a security 
protocol correct?”, In IEEE Symposium Research in Security and Privacy, IEEE Computer 
Society Press,  May 1998, pp. 24-34 
13. T.Y.C. Woo and S. S. Lam, “Authentication for Distributed Systems”, Computer, 25(1), 
January 1992, pp. 39-52 
14. T.Y.C. Woo and S. S. Lam, “A lesson on Authenticated Protocol design”, Operating Sys-
tems Review, 28(3), 1994, pp. 24-37 
12