Automated Reasoning for Security Protocol Analysis
Verifying the SET Purchase Protocols
Formal Analysis of Multiparty Contract Signing
Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks☆
Decidability Issues for Extended Ping-Pong Protocols
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures