The following publications are possibly variants of this publication:
- A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol AnalysisIliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov. isss2 2003: 356-383 [doi]
- Relating Strands and Multiset Rewriting for Security Protocol AnalysisIliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov. csfw 2000: 35-51 [doi]
- Multiset rewriting and the complexity of bounded security protocolsNancy A. Durgin, Patrick Lincoln, John C. Mitchell. jcs, 12(2):247-311, 2004.
- Relating multiset rewriting and process algebras for security protocol analysisStefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli. jcs, 13(1):3-47, 2005.
- Typed Multiset Rewriting Specifications of Security ProtocolsIliano Cervesato. ENTCS, 40:8-51, 2000. [doi]