@inproceedings(AbadiF01applied_pi, author = "Mart\'{\i }n Abadi and C{\'e}dric Fournet", year = "2001", title = "Mobile values, new names, and secure communication", editor = "Chris Hankin and Dave Schmidt", booktitle = "POPL", publisher = "ACM", pages = "104--115", url = "http://doi.acm.org/10.1145/360204.360213", ) @article(AbadiG99spi_calculus, author = "Mart\'{\i }n Abadi and Andrew D. Gordon", year = "1999", title = "A Calculus for Cryptographic Protocols: The spi Calculus", journal = "Inf. Comput.", volume = "148", number = "1", pages = "1--70", url = "http://dx.doi.org/10.1006/inco.1998.2740", ) @article(11psi_journal, author = "Jesper Bengtson and Magnus Johansson and Joachim Parrow and Bj{\"o}rn Victor", year = "2011", title = "Psi-calculi: a framework for mobile processes with nominal data and logic", journal = "Logical Methods in Computer Science", volume = "7", number = "1", url = "http://dx.doi.org/10.2168/LMCS-7(1:11)2011", ) @inproceedings(Blanchet04proverif, author = "Bruno Blanchet", year = "2004", title = "Automatic Proof of Strong Secrecy for Security Protocols", booktitle = "IEEE Symposium on Security and Privacy", publisher = "IEEE Computer Society", pages = "86--102", url = "http://doi.ieeecomputersociety.org/10.1109/SECPRI.2004.1301317", ) @article(Blanchet08cryptoverif, author = "Bruno Blanchet", year = "2008", title = "A Computationally Sound Mechanized Prover for Security Protocols", journal = "IEEE Trans. Dependable Sec. Comput.", volume = "5", number = "4", pages = "193--207", url = "http://dx.doi.org/10.1109/TDSC.2007.1005", ) @inproceedings(BuscemiM07ccpi, author = "Maria Grazia Buscemi and Ugo Montanari", year = "2007", title = "CC-Pi: A Constraint-Based Language for Specifying Service Level Agreements", editor = "Rocco {De Nicola}", booktitle = "16th European Symposium on Programming Programming Languages and Systems (ESOP'07)", series = "{LNCS}", volume = "4421", publisher = "Springer", pages = "18--32", url = "http://dx.doi.org/10.1007/978-3-540-71316-6_3", ) @inproceedings(cardelli98mobileambients, author = "Luca Cardelli and Andrew D. Gordon", year = "1998", title = "Mobile Ambients", editor = "M. Nivat", booktitle = "Foundations of Software Science and Computation Structure, FoSSaCS'98", series = "Lecture Notes in Computer Science", volume = "1378", publisher = "Springer", pages = "140--155", url = "http://dx.doi.org/10.1007/BFb0053547", ) @inproceedings(mitchell11PCL, author = "Anupam Datta and John C. Mitchell and Arnab Roy and Stephan Hyeonjun Stiller", year = "2011", title = "Protocol Composition Logic", editor = "V. Cortier and S. Kremer", booktitle = "Formal Models and Techniques for Analyzing Security Protocols", publisher = "IOS Press", doi = "10.3233/978-1-60750-714-7-182", ) @inproceedings(NicolaFMPT05qosCCpi, author = "Rocco {De Nicola} and Gian Luigi Ferrari and Ugo Montanari and Rosario Pugliese and Emilio Tuosto", year = "2005", title = "A Process Calculus for QoS-Aware Applications", editor = "Jean-Marie Jacquet and Gian Pietro Picco", booktitle = "7th International Conference on Coordination Models and Languages", series = "{LNCS}", volume = "3454", publisher = "Springer", pages = "33--48", url = "http://dx.doi.org/10.1007/11417019_3", ) @inproceedings(DrimerMA09CAP, author = "Saar Drimer and Steven J. Murdoch and Ross J. Anderson", year = "2009", title = "Optimised to Fail: Card Readers for Online Banking", editor = "Roger Dingledine and Philippe Golle", booktitle = "Financial Cryptography and Data Security", series = "{LNCS}", volume = "5628", publisher = "Springer", pages = "184--200", url = "http://dx.doi.org/10.1007/978-3-642-03549-4_11", ) @article(DurginMP03PCL, author = "Nancy A. Durgin and John C. Mitchell and Dusko Pavlovic", year = "2003", title = "A Compositional Logic for Proving Security Properties of Protocols", journal = "Journal of Computer Security", volume = "11", number = "4", pages = "677--722", url = "http://iospress.metapress.com/content/lgf63yyhl3ajnddt/", ) @misc(ellison07ceremony, author = "Carl Ellison", year = "2007", title = "Ceremony Design and Analysis", howpublished = "Cryptology ePrint Archive, Report 2007/399", url = "http://eprint.iacr.org/2007/399", ) @phdthesis(gischer84PhDpomsets, author = "Jay L. Gischer", year = "1984", title = "Partial Orders and the Axiomatic Theory of Shuffle", school = "CS, Stanford University", ) @article(GlabbeekG01refinement, author = "Rob J. van Glabbeek and Ursula Goltz", year = "2001", title = "Refinement of actions and equivalence notions for concurrent systems", journal = "Acta Informatica", volume = "37", number = "4/5", pages = "229--327", doi = "10.1007/s002360000041", url = "http://link.springer.de/link/service/journals/00236/bibs/1037004/10370229.htm", ) @book(fdr_book, author = "Michael Goldsmith and Gavin Lowe and Bill Roscoe and Peter Ryan and Steve Schneider", year = "2000", title = "Modelling and analysis of security protocols", publisher = "Pearson Education", ) @inproceedings(Grohmann08SecurityCryptAndDirectedBigraphs, author = "Davide Grohmann", year = "2008", title = "Security, Cryptography and Directed Bigraphs", booktitle = "4th International Conference on Graph Transformations (ICGT'08)", series = "{LNCS}", volume = "5214", publisher = "Springer-Verlag", pages = "487--489", url = "http://dx.doi.org/10.1007/978-3-540-87405-8_41", ) @article(Harel87statecharts, author = "David Harel", year = "1987", title = "Statecharts: A Visual Formulation for Complex Systems", journal = "Science of Computer Programmings", volume = "8", number = "3", pages = "231--274", url = "http://dx.doi.org/10.1016/0167-6423(87)90035-9", ) @book(harel03Play_book, author = "David Harel and Rami Marelly", year = "2003", title = "{Come, Let's Play -- Scenario-Based Programming Using LSCs and the Play-Engine}", publisher = "Springer", url = "http://www.springer.com/computer/programming/book/978-3-540-00787-6", ) @article(HarelN96statemate, author = "David Harel and Amnon Naamad", year = "1996", title = "{The STATEMATE Semantics of Statecharts}", journal = "ACM Trans. Softw. Eng. Methodol.", volume = "5", number = "4", pages = "293--333", url = "http://doi.acm.org/10.1145/235321.235322", ) @book(harel00dynamicLogic, author = "David Harel and Jerzy Tiuryn and Dexter Kozen", year = "2000", title = "Dynamic Logic", publisher = "MIT Press", address = "Cambridge, MA, USA", ) @book(hennessy07dpi_book, author = "Matthew Hennessy", year = "2007", title = "A Distributed Pi-Calculus", publisher = "Cambridge University Press", doi = "10.1017/CBO9780511611063", ) @article(dpi02, author = "Matthew Hennessy and James Riely", year = "2002", title = "Resource Access Control in Systems of Mobile Agents", journal = "Inf. Comput.", volume = "173", number = "1", pages = "82--120", url = "http://dx.doi.org/10.1006/inco.2001.3089", ) @inproceedings(Huttel11typed_psi, author = "Hans H{\"u}ttel", year = "2011", title = "Typed psi-calculi", editor = "Joost-Pieter Katoen and Barbara K{\"o}nig", booktitle = "CONCUR", series = "Lecture Notes in Computer Science", volume = "6901", publisher = "Springer", pages = "265--279", url = "http://dx.doi.org/10.1007/978-3-642-23217-6_18", ) @misc(huttel13private, author = "Hans H{\"u}ttel", year = "2013", title = "On Representing Located Process Calculi in the psi-calculus", howpublished = "personal communication", ) @book(latour05book, author = "Bruno Latour", year = "2005", title = "Reassembling the Social -- An Introduction to Actor-Network-Theory", publisher = "Oxford Univ.\ Press", ) @article(Lowe96, author = "Gavin Lowe", year = "1996", title = "Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR", journal = "Software - Concepts and Tools", volume = "17", number = "3", pages = "93--102", doi = "10.1007/3-540-61042-1_43", ) @book(milner09book, author = "Robin Milner", year = "2009", title = "{The Space and Motion of Communicating Agents}", publisher = "Cambridge Univ.Press", doi = "10.1017/CBO9780511626661", ) @article(milner92picalcul, author = "Robin Milner and Joachim Parrow and David Walker", year = "1992", title = "A Calculus of Mobile Processes, I-II", journal = "Information and Computation", volume = "100", number = "1", pages = "1--77", doi = "10.1016/0890-5401(92)90008-4", ) @inproceedings(MitchellMS97murphi, author = "John C. Mitchell and Mark Mitchell and Ulrich Stern", year = "1997", title = "Automated analysis of cryptographic protocols using Murphi", booktitle = "IEEE Symposium on Security and Privacy", publisher = "IEEE Computer Society", pages = "141--151", url = "http://doi.ieeecomputersociety.org/10.1109/SECPRI.1997.601329", ) @book(NipkowPW02, author = "Tobias Nipkow and Lawrence C. Paulson and Markus Wenzel", year = "2002", title = "Isabelle/HOL - A Proof Assistant for Higher-Order Logic", series = "Lecture Notes in Computer Science", volume = "2283", publisher = "Springer", url = "http://dx.doi.org/10.1007/3-540-45949-9", ) @inproceedings(hakon13nwpt, author = "H\r a{}kon Norman", year = "2013", title = "{Event Structures as Psi-calculi}", editor = "Tarmo Uustalu and Juri Vain", booktitle = "25th Nordic Workshop on Programming Theory (NWPT13)", ) @article(Paulson98isabell, author = "Lawrence C. Paulson", year = "1998", title = "The Inductive Approach to Verifying Cryptographic Protocols", journal = "Journal of Computer Security", volume = "6", number = "1-2", pages = "85--128", url = "http://iospress.metapress.com/content/5wlu8p2am1du051d/", ) @article(pavlovic11ActorNet_journal, author = "Dusko Pavlovic and Catherine Meadows", year = "2011", title = "Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions", journal = "arXiv.org", url = "http://arxiv.org/abs/1106.0706", ) @article(PierceS96typed_pi, author = "Benjamin C. Pierce and Davide Sangiorgi", year = "1996", title = "Typing and Subtyping for Mobile Processes", journal = "Mathematical Structures in Computer Science", volume = "6", number = "5", pages = "409--453", doi = "10.1.1.49.2751", ) @article(pieters2011representing, author = "Wolter Pieters", year = "2011", title = "Representing humans in system security models: An actor-network approach", journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications", volume = "2", number = "1", pages = "75--92", ) @book(pitts_book_nominal, author = "Andrew M. Pitts", year = "2013", title = "Nominal Sets: Names and Symmetry in Computer Science", series = "Cambridge Tracts in Theoretical Computer Science", volume = "57", publisher = "Cambridge Univ. Press", doi = "10.1017/CBO9781139084673", ) @article(Pratt86pomsets, author = "Vaughan R. Pratt", year = "1986", title = "{Modeling Concurrency with Partial Orders}", journal = "J. Parallel Programming", volume = "15", number = "1", pages = "33--71", url = "http://dx.doi.org/10.1007/BF01379149", ) @inproceedings(RadkeBNB11ceremony, author = "Kenneth Radke and Colin Boyd and Juan Manuel Gonz{\'a}lez Nieto and Margot Brereton", year = "2011", title = "Ceremony Analysis: Strengths and Weaknesses", booktitle = "26th IFIP-TC-11 International Information Security Conference (SEC)", series = "IFIP Advances in Information and Communication Technology", volume = "354", publisher = "Springer", pages = "104--115", url = "http://dx.doi.org/10.1007/978-3-642-21424-0_9", ) @book(sangiorgiwalker02pibook, author = "Davide Sangiorgi and David Walker", year = "2001", title = "The $\pi $-Calculus: a Theory of Mobile Processes", publisher = "Cambridge Univ.\ Press", ) @inproceedings(SternD97murphi_paralel, author = "Ulrich Stern and David L. Dill", year = "1997", title = "Parallelizing the Mur{\it phi} Verifier", editor = "Orna Grumberg", booktitle = "9th International Conference on Computer Aided Verification (CAV)", series = "{LNCS}", volume = "1254", publisher = "Springer", pages = "256--278", url = "http://dx.doi.org/10.1007/3-540-63166-6_26", ) @inproceedings(Winskel86, author = "Glynn Winskel", year = "1986", title = "Event Structures", booktitle = "Advances in Petri Nets", series = "{LNCS}", volume = "255", publisher = "Springer", pages = "325--392", url = "http://dx.doi.org/10.1007/3-540-17906-2_31", ) @incollection(winskel95modelsCategory, author = "Glynn Winskel and Mogens Nielsen", year = "1995", title = "Models for Concurrency", editor = "Samson Abramski and Dov M. Gabbay and Tom S.E. Maibaum", booktitle = "Handbook of Logic in Computer Science -- vol 4 -- Semantic Modelling", publisher = "Oxford University Press", pages = "1--148", )