1. Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, Edinburgh, United Kingdom, July 17-19. IEEE Computer Society, Los Alamitos (2010)
2. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: POPL, pp. 104–115 (2001)
3. Aceto, L., Hennessy, M.: Towards action-refinement in process algebras. Inf. Comput. 103(2), 204–269 (1993)
4. Backes, M., Pfitzmann, B., Waidner, M.: A Universally Composable Cryptographic Library. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC. ACM Press, New York (2003); Extended version available as Report 2003/015 of Cryptology ePrint Archive
5. Lecture Notes in Computer Science;M. Bellare,1996