The following publications are possibly variants of this publication:
- A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) ModelKim-Kwang Raymond Choo. cj, 50(5):591-601, 2007. [doi]
- A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) ModelKim-Kwang Raymond Choo. iacr, 2007:188, 2007. [doi]
- On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol RevisitedKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland. iacr, 2004:345, 2004. [doi]
- On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol RevisitedKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland. scn 2005: 351-366 [doi]
- The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocolsKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock. comcom, 29(15):2788-2797, 2006. [doi]