Martín Abadi & Cédric Fournet (2001):
Mobile values, new names, and secure communication.
In: Chris Hankin & Dave Schmidt: POPL.
ACM,
pp. 104–115.
Available at http://doi.acm.org/10.1145/360204.360213.
Martín Abadi & Andrew D. Gordon (1999):
A Calculus for Cryptographic Protocols: The spi Calculus.
Inf. Comput. 148(1),
pp. 1–70.
Available at http://dx.doi.org/10.1006/inco.1998.2740.
Jesper Bengtson, Magnus Johansson, Joachim Parrow & Björn Victor (2011):
Psi-calculi: a framework for mobile processes with nominal data and logic.
Logical Methods in Computer Science 7(1).
Available at http://dx.doi.org/10.2168/LMCS-7(1:11)2011.
Bruno Blanchet (2008):
A Computationally Sound Mechanized Prover for Security Protocols.
IEEE Trans. Dependable Sec. Comput. 5(4),
pp. 193–207.
Available at http://dx.doi.org/10.1109/TDSC.2007.1005.
Maria Grazia Buscemi & Ugo Montanari (2007):
CC-Pi: A Constraint-Based Language for Specifying Service Level Agreements.
In: Rocco De Nicola: 16th European Symposium on Programming Programming Languages and Systems (ESOP'07),
LNCS 4421.
Springer,
pp. 18–32.
Available at http://dx.doi.org/10.1007/978-3-540-71316-6_3.
Luca Cardelli & Andrew D. Gordon (1998):
Mobile Ambients.
In: M. Nivat: Foundations of Software Science and Computation Structure, FoSSaCS'98,
Lecture Notes in Computer Science 1378.
Springer,
pp. 140–155.
Available at http://dx.doi.org/10.1007/BFb0053547.
Anupam Datta, John C. Mitchell, Arnab Roy & Stephan Hyeonjun Stiller (2011):
Protocol Composition Logic.
In: V. Cortier & S. Kremer: Formal Models and Techniques for Analyzing Security Protocols.
IOS Press,
doi:10.3233/978-1-60750-714-7-182.
Rocco De Nicola, Gian Luigi Ferrari, Ugo Montanari, Rosario Pugliese & Emilio Tuosto (2005):
A Process Calculus for QoS-Aware Applications.
In: Jean-Marie Jacquet & Gian Pietro Picco: 7th International Conference on Coordination Models and Languages,
LNCS 3454.
Springer,
pp. 33–48.
Available at http://dx.doi.org/10.1007/11417019_3.
Saar Drimer, Steven J. Murdoch & Ross J. Anderson (2009):
Optimised to Fail: Card Readers for Online Banking.
In: Roger Dingledine & Philippe Golle: Financial Cryptography and Data Security,
LNCS 5628.
Springer,
pp. 184–200.
Available at http://dx.doi.org/10.1007/978-3-642-03549-4_11.
Nancy A. Durgin, John C. Mitchell & Dusko Pavlovic (2003):
A Compositional Logic for Proving Security Properties of Protocols.
Journal of Computer Security 11(4),
pp. 677–722.
Available at http://iospress.metapress.com/content/lgf63yyhl3ajnddt/.
Carl Ellison (2007):
Ceremony Design and Analysis.
Cryptology ePrint Archive, Report 2007/399.
Available at http://eprint.iacr.org/2007/399.
Jay L. Gischer (1984):
Partial Orders and the Axiomatic Theory of Shuffle.
CS, Stanford University.
Michael Goldsmith, Gavin Lowe, Bill Roscoe, Peter Ryan & Steve Schneider (2000):
Modelling and analysis of security protocols.
Pearson Education.
Davide Grohmann (2008):
Security, Cryptography and Directed Bigraphs.
In: 4th International Conference on Graph Transformations (ICGT'08),
LNCS 5214.
Springer-Verlag,
pp. 487–489.
Available at http://dx.doi.org/10.1007/978-3-540-87405-8_41.
David Harel (1987):
Statecharts: A Visual Formulation for Complex Systems.
Science of Computer Programmings 8(3),
pp. 231–274.
Available at http://dx.doi.org/10.1016/0167-6423(87)90035-9.
David Harel & Amnon Naamad (1996):
The STATEMATE Semantics of Statecharts.
ACM Trans. Softw. Eng. Methodol. 5(4),
pp. 293–333.
Available at http://doi.acm.org/10.1145/235321.235322.
David Harel, Jerzy Tiuryn & Dexter Kozen (2000):
Dynamic Logic.
MIT Press,
Cambridge, MA, USA.
Matthew Hennessy (2007):
A Distributed Pi-Calculus.
Cambridge University Press,
doi:10.1017/CBO9780511611063.
Matthew Hennessy & James Riely (2002):
Resource Access Control in Systems of Mobile Agents.
Inf. Comput. 173(1),
pp. 82–120.
Available at http://dx.doi.org/10.1006/inco.2001.3089.
Hans Hüttel (2011):
Typed psi-calculi.
In: Joost-Pieter Katoen & Barbara König: CONCUR,
Lecture Notes in Computer Science 6901.
Springer,
pp. 265–279.
Available at http://dx.doi.org/10.1007/978-3-642-23217-6_18.
Hans Hüttel (2013):
On Representing Located Process Calculi in the psi-calculus.
personal communication.
Bruno Latour (2005):
Reassembling the Social – An Introduction to Actor-Network-Theory.
Oxford Univ. Press.
Gavin Lowe (1996):
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR.
Software - Concepts and Tools 17(3),
pp. 93–102,
doi:10.1007/3-540-61042-1_43.
Robin Milner (2009):
The Space and Motion of Communicating Agents.
Cambridge Univ.Press,
doi:10.1017/CBO9780511626661.
Robin Milner, Joachim Parrow & David Walker (1992):
A Calculus of Mobile Processes, I-II.
Information and Computation 100(1),
pp. 1–77,
doi:10.1016/0890-5401(92)90008-4.
John C. Mitchell, Mark Mitchell & Ulrich Stern (1997):
Automated analysis of cryptographic protocols using Murphi.
In: IEEE Symposium on Security and Privacy.
IEEE Computer Society,
pp. 141–151.
Available at http://doi.ieeecomputersociety.org/10.1109/SECPRI.1997.601329.
Tobias Nipkow, Lawrence C. Paulson & Markus Wenzel (2002):
Isabelle/HOL - A Proof Assistant for Higher-Order Logic.
Lecture Notes in Computer Science 2283.
Springer.
Available at http://dx.doi.org/10.1007/3-540-45949-9.
Håkon Norman (2013):
Event Structures as Psi-calculi.
In: Tarmo Uustalu & Juri Vain: 25th Nordic Workshop on Programming Theory (NWPT13).
Dusko Pavlovic & Catherine Meadows (2011):
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions.
arXiv.org.
Available at http://arxiv.org/abs/1106.0706.
Benjamin C. Pierce & Davide Sangiorgi (1996):
Typing and Subtyping for Mobile Processes.
Mathematical Structures in Computer Science 6(5),
pp. 409–453,
doi:10.1.1.49.2751.
Wolter Pieters (2011):
Representing humans in system security models: An actor-network approach.
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(1),
pp. 75–92.
Andrew M. Pitts (2013):
Nominal Sets: Names and Symmetry in Computer Science.
Cambridge Tracts in Theoretical Computer Science 57.
Cambridge Univ. Press,
doi:10.1017/CBO9781139084673.
Vaughan R. Pratt (1986):
Modeling Concurrency with Partial Orders.
J. Parallel Programming 15(1),
pp. 33–71.
Available at http://dx.doi.org/10.1007/BF01379149.
Kenneth Radke, Colin Boyd, Juan Manuel González Nieto & Margot Brereton (2011):
Ceremony Analysis: Strengths and Weaknesses.
In: 26th IFIP-TC-11 International Information Security Conference (SEC),
IFIP Advances in Information and Communication Technology 354.
Springer,
pp. 104–115.
Available at http://dx.doi.org/10.1007/978-3-642-21424-0_9.
Davide Sangiorgi & David Walker (2001):
The π-Calculus: a Theory of Mobile Processes.
Cambridge Univ. Press.
Ulrich Stern & David L. Dill (1997):
Parallelizing the Murphi Verifier.
In: Orna Grumberg: 9th International Conference on Computer Aided Verification (CAV),
LNCS 1254.
Springer,
pp. 256–278.
Available at http://dx.doi.org/10.1007/3-540-63166-6_26.