1. Apims (2014).
http://thelas.dk/index.php?title=Apims
2. Bartoletti, M., Castellani, I., Deniélou, P.-M., Dezani-Ciancaglini, M., Ghilezan, S., Pantovic, J., Pérez, J.A., Thiemann, P., Toninho, B., Vieira, H.T.: Combining behavioural types with security analysis (2014, Submitted for Journal Publication)
3. Lecture Notes in Computer Science;L Bettini,2008
4. Bhargavan, K., Corin, R., Deniélou, P.-M., Fournet, C., Leifer, J.J.: Cryptographic protocol synthesis and verification for multiparty sessions. In: Mitchell, J.C. (ed.) CSF 2009, pp. 124–140. IEEE Computer Society Press, Los Alamitos (2009)
5. Lecture Notes in Computer Science;L Bocchi,2013