1. Abadi, M., Gordon, A.: A calculus for cryptographic protocols: the spi calculus. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, CCS 1997, pp. 36–47. ACM (1997)
2. Lecture Notes in Computer Science;C Bodei,2015
3. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Automatic validation of protocol narration. In: Computer Security Foundations Workshop (CSFW-16 2003), pp. 126–140. IEEE Computer Society (2003)
4. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. J. Comput. Secur. 13(3), 347–390 (2005)
5. Bodei, C., Galletta, L.: Securing IoT communications: at what cost?. In: Cortier, V. (ed.) Proceeding HotSpot 2016 (2016).
http://www.loria.fr/cortier/HotSpot2016/HotSpot2016-proceedings.pdf