P. R. Zimmermann, Pgpfone: Pretty good privacy phone owner's manual, version 1, 1996.

F. Stajano and R. Anderson, The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. Information Hiding, pp.434-447, 2000.

M. Burrows, M. Abadi, and R. M. Needham, A logic of Authentication, DEC System Research Center, vol.22, 1990.

M. Bellare and P. Rogaway, Entity authentication and key distribution. Crypto'93, pp.232-249, 1993.
DOI : 10.1007/3-540-48329-2_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.3423

P. F. Syverson and P. C. Van-oorschot, On unifying some cryptographic protocol logics, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp.1063-7109, 1994.
DOI : 10.1109/RISP.1994.296595

URL : http://www.dtic.mil/get-tr-doc/pdf?AD=ADA465512

D. Gollmann, What do we mean by entity authentication?, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.46-54, 1996.
DOI : 10.1109/SECPRI.1996.502668

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997.
DOI : 10.1109/CSFW.1997.596782

N. Ahmed and C. D. Jensen, Demarcation of Security in Authentication Protocols, 2011 First SysSec Workshop, pp.43-50, 2011.
DOI : 10.1109/SysSec.2011.13

B. Barak, R. Canetti, Y. Lindell, R. Pass, and T. And-rabin, Secure computation without authentication, pp.361-377, 2005.
DOI : 10.1007/11535218_22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.3215

D. Gollmann, Authentication?myths and misconception. Cryptography and Computational Number Theory, pub, pp.203-225, 2001.
DOI : 10.1007/978-3-0348-8295-8_17

C. Boyd and A. Mathuria, Protocols for Authentication and Key Establishment. pub, pp.978-981, 2003.
DOI : 10.1007/978-3-662-09527-0

M. Kurkowski and M. Srebrny, A Quantifier-free First-order Knowledge Logic of Authentication, IOS, 2006.

C. J. Cremers, Scyther: Semantics and Verification of Security Protocols. IPA Dissertation Series, 2006.
DOI : 10.1007/978-3-540-78636-8

A. W. Roscoe, Intensional specifications of security protocols, Proceedings 9th IEEE Computer Security Foundations Workshop, pp.28-38, 1996.
DOI : 10.1109/CSFW.1996.503688

N. Ahmed and C. D. Jensen, Definition of entity authentication, 2010 2nd International Workshop on Security and Communication Networks (IWSCN), pp.1-7, 2010.
DOI : 10.1109/IWSCN.2010.5498000

N. Ahmed and C. D. Jensen, Adaptable authentication model, Proc.: ESSoS, pub. Springer, pp.234-247

O. Goldreich, Foundations of cryptography: Basic applications, 2004.

A. Juels, RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.381-394, 2006.
DOI : 10.1109/JSAC.2005.861395

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.329.6789

W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.9720

U. Amazon, S. Web, E. Zenner, A. Weimerskirch, and D. Westhoff, Concrete security for entity recognition: The Jane Doe protocol, IndoCrypt, pp.158-171, 2008.

D. Basin, S. Mödersheim, and L. Vigano, OFMC: A symbolic model checker for security protocols, International J. of Information Security, pp.181-208, 2005.
DOI : 10.1007/s10207-004-0055-7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.9886

C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H. R. Nielson, Static validation of security protocols, Journal of Computer Security, vol.13, issue.3, pp.347-390, 2005.
DOI : 10.3233/JCS-2005-13302

URL : http://doi.org/10.3233/jcs-2005-13302

A. C. Squicciarini, A. Bhargav-spantzel, E. Bertino, and A. B. Czeksis, Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies, Proc.: ICICS'07, pp.386-397, 2007.
DOI : 10.1007/978-3-540-77048-0_30

M. Abadi, Two facets of authentication, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), pp.27-32, 1998.
DOI : 10.1109/CSFW.1998.683152

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.6490

R. Gorrieri, F. Martinelli, and M. Petrocchi, A Formalization of Credit and Responsibility Within the GNDC Schema, Electronic Notes in Theoretical Computer Science, vol.157, issue.3, pp.61-78, 2006.
DOI : 10.1016/j.entcs.2005.09.040