1. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: ACM Symposium on Principles of Programming Languages, pp. 104–115 (2001)
2. Abadi, M., Fournet, C.: Private Authentication. Theoretical Computer Science 322(3), 427–476 (2004)
3. Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code. In: IEEE Symposium on Security and Privacy, pp. 2–11 (2001)
4. Lecture Notes in Computer Science;M. Arapinis,2007
5. Avanesov, T., Chevalier, Y., Rusinowitch, M., Turuani, M.: Intruder deducibility constraints with negation. CoRR, abs/1207.4871 (2012)