B. Torke Ladani, “Formal Analyzing of Security Protocols,” PHD Dissertation, Tarbiat Modars Universiry, 2004.
M. Abadi, B. Blanchet, and C. Fournet, “The applied pi calculus: Mobile values, new names, and secure
communication,” Report arXiv: 1609.03003v1, September 2016. Available at http://arxiv.org/abs/1609.03003v1.
B. Blanchet, “Automatic Verification of Security Protocols in the Symbolic Model: the Verifier ProVerif. In FOSAD 7,” LNCS, vol. 8604, pp. 54-87, 2014.
B. Blanchet, “Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif,” Foundations and Trends in Privacy and Security, pp. 1-135, October 2016.
D. Basin, C. Cremers, and C. Meadow, “Handbook of Model Checking: Model Checking Security Protocols,” springer,
C. Cremers and S. Mauw, “Operational Semantics and Verification of Security Protocols,” Springer, 2012.
C. Cremers, “The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols,” CAV 2008, LNCS, vol. 5123, pp. 414-418, 2008.
S. Duan, “Security Analysis of TETRA,” Master thesis, Norwegian University of Science and Technology, 2013.
“ETSI Technical Standard ETSI EN 302 109 V1.1.1 Terrestrial Trunked Radio (TETRA),” Security
Synchronization mechanism for end-to-end encryption, 2003.
“TETRA Association SFPG Information document,” Overview of Standard TETRA Cryptographic Algorithms and
their rules for management and distribution.
ETSI Technical Report TR 052101 V1.1.1: SAGE Rules for the management of the TETRA standard authentication and key management algorithm set TAA1.
ETSI Technical Report TR 1-0530101 V1.1.2: SAGE Rules for the management of the TETRA standard encryption algorithms Part1 TEA1.
ETSI Technical Standard ETSI EN 300 392-7 V2.1.1: Terrestrial Trunked Radio (TETRA), Voice plus Data( V+D), Part 7: Security.