7Lowe G.. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software-Concepts and Tools, 1996, 17(3): 93~102.
8Millen J.. The Interrogator model. In: Proceedings of the 1995 IEEE Symposium on Security and Privacy, Oakland, California, USA, 1995, 251~260.
9Clarke E.M., Jha S., Marrero W.. Verifying security protocols with Brutus. ACM Transactions on Software Engineering and Methodology, 2000, 9(4): 443~487.
10Mitchell J.C., Mitchell M., Stern U.. Automated analysis of cryptographic protocols using Murφ. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, California, USA, 1997, 141~153.