1. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proc. 28th ACM Symposium on Principles of Programming Languages (POPL 2001), pp. 104–115. ACM Press, New York (2001)
2. Abadi, M., Gordon, A.: A calculus for cryptographic protocols: The spi calculus. In: Proc. 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, pp. 36–47. ACM Press, New York (1997)
3. Arapinis, M., Chothia, T., Ritter, E., Ryan, M.: Analysing unlinkability and anonymity using the applied pi calculus. In: Proc. 23rd IEEE Computer Security Foundations Symposium (CSF 2010), pp. 107–121. IEEE Computer Society Press, Los Alamitos (2010)
4. Backes, M., Maffei, M., Unruh, D.: Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. In: Proc. Symposium on Security and Privacy (S&P 2008), pp. 202–215. IEEE Computer Society Press, Los Alamitos (2008)
5. Blanchet, B.: Cryptographic Protocol Verifier User Manual (2004),
http://www.di.ens.fr/~blanchet/crypto/proverif-manual.ps.gz