1. Abadi, M., Blanchet, B., Fournet, C.: The applied pi calculus: mobile values, new names, and secure communication. J. ACM 65(1), 1–41 (2017)
2. Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. In: Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005), pp. 331–340. IEEE (2005)
3. Cortier, V., Rusinowitch, M., Zalinescu, E.: Relating two standard notions of secrecy. Log. Methods Comput. Sci. 3(3), 303–318 (2007)
4. IFIP – The International Federation for Information Processing;S Delaune,2008
5. Mödersheim, S., Viganò, L.: Alpha-beta privacy. ACM Transactions on Privacy and Security. Preprint available as DTU Compute Technical report-2018-7 (2018).
http://imm.dtu.dk/~samo/abpn.pdf