1. A calculus for cryptographic protocols: the Spi-calculus;Abadi;Information and Computation,1999
2. A process-algebraic approach for the analysis of probabilistic non-interference;Aldini;Journal of Computer Security,2004
3. E. Bach, et al., What’s a key-guessing attack? What’s entropy? in: Cryptography Frequently Asked Questions, Section 4.9. Avaliable from: .
4. M. Boreale, Quantifying information leakage in process calculi, in: ICALP 2006, LNCS, vol. 4052, Springer, 2006.
5. Testing equivalence for mobile processes;Boreale;Information and Computation,1995