calculi.bib

Abadi1999A-Calculus-for-
A Calculus for Cryptographic Protocols: The spi Calculus
Abadi, M. and Gordon, A. D.
  Inf. Comput.  148  1-70  (1999)
http://www.soe.ucsc.edu/~abadi/Papers/spi.ps
Abadi2001Mobile-values-n
Mobile values, new names, and secure communication
Abadi, M. and Fournet, C.
POPL      104-115  (2001)
http://doi.acm.org/10.1145/360204.360213
Fournet2002Hiding-Names:-P
Hiding Names: Private Authentication in the Applied Pi Calculus
Fournet, C. and Abadi, M.
ISSS      317-338  (2002)
http://research.microsoft.com/users/fournet/papers/hiding-names--private-authentication-in-the-applied-pi-calculus-isss02.pdf
Debbabi2003Security-by-typ
Security by typing
Debbabi, M. and Durgin, N. A. and Mejri, M. and Mitchell, J. C.
  STTT  4  472-495  (2003)
http://dx.doi.org/10.1007/s10009-002-0100-7
Gordon2005Secrecy-Despite
Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus
Gordon, A. D. and Jeffrey, A.
CONCUR      186-201  (2005)
http://dx.doi.org/10.1007/11539452_17
Bhargavan2006Verified-Intero
Verified Interoperable Implementations of Security Protocols
Bhargavan, K. and Fournet, C. and Gordon, A. D. and Tse, S.
CSFW      139-152  (2006)
http://research.microsoft.com/~adg/Publications/tfng-csfw-2006.pdf
Chaudhuri2006Formal-Analysis
Formal Analysis of Dynamic, Distributed File-System Access Controls
Chaudhuri, A. and Abadi, M.
FORTE      99-114  (2006)
http://dx.doi.org/10.1007/11888116_8
Abadi2006Computational-S
Computational Secrecy by Typing for the Pi Calculus
Abadi, M. and Corin, R. and Fournet, C.
APLAS      253-269  (2006)
http://dx.doi.org/10.1007/11924661_16