@article(Ab97, author = {M.~Abadi}, year = {1999}, title = {Secrecy by Typing In Security protocols}, journal = {Journal of the ACM}, volume = {5}, number = {46}, pages = {18--36}, doi = {10.1145/324133.324266}, ) @techreport(BL73, author = {D.E. Bell and L.J. LaPadula}, year = {1976}, title = {Secure Computer Systems: Unified Exposition and {M}ultics Interpretation.}, type = {Technical Report}, number = {ESD-TR-75-306}, institution = {Mitre C.}, ) @phdthesis(phdBod, author = {C.~Bodei}, year = {2000}, title = {Security Issues in Process Calculi.}, school = {Dipartimento di Informatica, Universit\`{a} di Pisa. TD-2/00, March, 2000}, ) @inproceedings(BBF15, author = {C.~Bodei and L.~Brodo and R.~Focardi}, year = {2015}, title = {Static Evidences for Attack Reconstruction}, booktitle = {Programming Languages with Applications to Biology and Security}, series = {LNCS}, volume = {9465}, publisher = {Springer}, pages = {162--182}, doi = {10.1007/978-3-319-25527-9}, ) @article(BBDNN_JCS, author = {C.~Bodei and M.~Buchholtz and P.~Degano and F.~Nielson and H.~Riis Nielson}, year = {2005}, title = {Static validation of security protocols}, journal = {Journal of Computer Security}, volume = {13}, number = {3}, pages = {347--390}, doi = {10.3233/JCS-2005-13302}, ) @inproceedings(BDFG_Coord16, author = {C.~Bodei and P.~Degano and G-L. Ferrari and L.~Galletta}, year = {2016}, title = {Where do your {IoT} ingredients come from?}, booktitle = {Procs.~of Coordination 2016}, series = {LNCS}, volume = {9686}, publisher = {Springer}, pages = {35--50}, doi = {10.1007/978-3-319-39519-7}, ) @article(BBDNN_InfComp, author = {C.~Bodei and P.~Degano and F.~Nielson and H.~Riis Nielson}, year = {2001}, title = {Static analysis for the $\pi$-calculus with applications to security}, journal = {Information and Computation}, volume = {168}, pages = {68--92}, doi = {10.1006/inco.2000.3020}, ) @article(BNN03, author = {M.~Buchholtz and H.~Riis Nielson and F.~Nielson, Flemming}, year = {2004}, title = {A calculus for control flow analysis of security protocols}, journal = {International Journal of Information Security}, volume = {2}, number = {3}, pages = {145--167}, doi = {10.1007/s10207-004-0036-x}, ) @article(CG01, author = {N.~Carriero and D.~Gelernter}, year = {2001}, title = {A Computational Model of Everything}, journal = {Commun. {ACM}}, volume = {44}, number = {11}, pages = {77--81}, doi = {10.1145/384150.384165}, ) @book(Den82, author = {D.E Denning}, year = {1982}, title = {Cryptography and Data Security}, publisher = {Addison-Wesley, Reading Mass.}, ) @article(Elejoste, author = {P.~Elejoste and A.~Perallos and A.~Chertudi and I.~Angulo and A.~Moreno and L.~Azpilicueta and J.J Astrain and F.~Falcone and J.~E. Villadangos}, year = {2013}, title = {An Easy to Deploy Street Light Control System Based on Wireless Communication and LED Technology}, journal = {Sensors}, volume = {13}, number = {5}, pages = {6492--6523}, doi = {10.3390/s130506492}, ) @article(ECMC14, author = {S.~Escolar and J.~Carretero and M.~Marinescu and S~Chessa}, year = {2014}, title = {Estimating Energy Savings in Smart Street Lighting by Using an Adaptive Control System}, journal = {{IJDSN}}, volume = {2014}, doi = {10.1155/2014/971587}, ) @article(G85, author = {D.~Gelernter}, year = {1985}, title = {Generative Communication in {Linda}}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {7}, number = {1}, pages = {80--112}, doi = {10.1145/2363.2433}, ) @article(CAS91, author = {M.~Herlihy}, year = {1991}, title = {Wait-Free Synchronization}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {13}, number = {1}, pages = {124--149}, doi = {10.1145/114005.102808}, ) @misc(IERC, author = {IERC}, year = {2012}, title = {{The Internet of Things 2012 -- New Horizons}}, url = {http://www.internet-of-things-research.eu/pdf/IERC_Cluster_Book_2012_WEB.pdf}, ) @inproceedings(lanese13, author = {I.~Lanese and L.~Bedogni and M.~Di Felice}, year = {2013}, title = {Internet of {t}hings: a process calculus approach}, booktitle = {Procs of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13}, publisher = {{ACM}}, pages = {1339--1346}, doi = {10.1145/2480362.2480615}, ) @article(lanese10, author = {I.~Lanese and D.~Sangiorgi}, year = {2010}, title = {An operational semantics for a calculus for wireless systems}, journal = {Theor. Comput. Sci.}, volume = {411}, number = {19}, pages = {1928--1948}, doi = {10.1016/j.tcs.2010.01.023}, ) @inproceedings(merro16, author = {R.~Lanotte and M.~Merro}, year = {2016}, title = {A Semantic Theory of the {I}nternet of {T}hings.}, booktitle = {Procs.~of Coordination 2016}, series = {LNCS}, volume = {9686}, publisher = {Springer}, pages = {157--174}, doi = {10.1007/978-3-319-39519-7}, ) @article(NNN10, author = {S.~Nanz and F.~Nielson and H.~Riis Nielson}, year = {2010}, title = {Static analysis of topology-dependent broadcast networks}, journal = {Inf. Comput.}, volume = {208}, number = {2}, pages = {117--139}, doi = {10.1016/j.ic.2009.10.003}, ) @article(singh10, author = {A.~Singh and C.~R. Ramakrishnan and S.A. Smolka}, year = {2010}, title = {A process calculus for Mobile Ad Hoc Networks}, journal = {Sci. Comput. Program.}, volume = {75}, number = {6}, pages = {440--469}, doi = {10.1016/j.scico.2009.07.008}, ) @misc(ZigBee, author = {T.~Zillner}, year = {2015}, title = {{ZigBee Exploited}}, url = {https://www.blackhat.com/docs/us-15/materials/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly-wp.pdf}, )