SECURITY 2: NEEDHAM-SCHROEDER PROTOCOL

Lowe, Gavin: Breaking and fixing the Needham–Schroeder public-key protocol using FDR. Software : concepts and tools, volume 17, issue 3, 1996. Pages 93–102. www.mcs.le.ac.uk/~glowe/Security/Papers/NSFDR.ps