Elsevier
Electronic Notes in Theoretical Computer Science
International Workshop on Parallel and Distributed Methods in Verification
Specification and Analysis of Embedded Systems

Blom, S., Groote, J. F., Mauw, S., & Serebrenik, A. (2005). Analysing the BKE-security protocol with $\mu$CRL. In Electronic Notes in Theoretical Computer Science (Vol. 139, pp. 49–90). Elsevier.