G. Bella and L. Coles-kemp, Layered Analysis of Security Ceremonies, IFIP Advances in Inf. and Communication Technology, pp.273-286, 2012.
DOI : 10.1007/978-3-642-30436-1_23

R. Biddle, P. C. Van-oorschot, A. S. Patrick, J. Sobey, and T. Whalen, Browser interfaces and extended validation SSL certificates, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.19-30, 2009.
DOI : 10.1145/1655008.1655012

T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, p.5246, 2008.
DOI : 10.17487/rfc5246

C. Ellison, Ceremony design and analysis. IACR eprint archive pp, pp.1-17, 2007.

C. A. Hoare, Communicating sequential processes, Communications of the ACM, vol.21, issue.8, pp.666-677, 1978.
DOI : 10.1145/359576.359585

J. Sun, Y. Liu, J. S. Dong, and J. Pang, PAT: Towards Flexible Verification under Fairness, Proc. of CAV'09, pp.709-714, 2009.
DOI : 10.1007/978-3-642-02658-4_59

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.151.806

J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor, Crying wolf: An empirical study of SSL warning effectiveness, Proc. of USENIX'09, 2009.