• Application of dependency graphs to security protocol analysisTÅ¡ahhirov, Ilja; Laud, PeeterTrustworthy global computing2008 / p. 294-311 : ill https://link.springer.com/chapter/10.1007/978-3-540-78663-4_20