M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proc. of POPL'01, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Bartoletti, I. Castellani, P. Deniélou, M. Dezani-ciancaglini, S. Ghilezan et al., Combining behavioural types with security analysis, Journal of Logical and Algebraic Methods in Programming, vol.84, issue.6, pp.763-780, 2015.
DOI : 10.1016/j.jlamp.2015.09.003

URL : https://hal.archives-ouvertes.fr/hal-01213201

B. Blanchet, Modeling and verifying security protocols with the applied pi calculus and proverif. Foundations and Trends in Privacy and Security, pp.1-135, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01423760

S. Capecchi, I. Castellani, and M. Dezani-ciancaglini, Typing access control and secure information flow in sessions, Information and Computation, vol.238, pp.68-105, 2014.
DOI : 10.1016/j.ic.2014.07.005

URL : https://hal.archives-ouvertes.fr/hal-01088782

M. Coppo, M. Dezani-ciancaglini, L. Padovani, and N. Yoshida, A Gentle Introduction to Multiparty Asynchronous Session Types, Formal Methods for Multicore Programming, pp.146-178, 2015.
DOI : 10.1007/978-3-319-14128-2_3

URL : http://spiral.imperial.ac.uk/bitstream/10044/1/27022/2/gentle-introduction.pdf

R. Corin, P. Deniélou, C. Fournet, K. Bhargavan, and J. J. Leifer, Secure Implementations for Typed Session Abstractions, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.170-186, 2007.
DOI : 10.1109/CSF.2007.29

URL : https://ris.utwente.nl/ws/files/5387402/04271648.pdf

V. Cortier and S. Kremer, Formal Models and Techniques for Analyzing Security Protocols: A Tutorial, Foundations and Trends?? in Programming Languages, vol.1, issue.3, pp.151-267, 2014.
DOI : 10.1561/2500000001

URL : https://hal.archives-ouvertes.fr/hal-01090874

J. A. Garay, M. Jakobsson, and P. D. Mackenzie, Abuse-Free Optimistic Contract Signing, Proc. of CRYPTO'99, pp.449-466, 1999.
DOI : 10.1007/3-540-48405-1_29

URL : http://www.mathmagic.cn/crypt1998-2003/papers/1666/16660449.pdf

K. Honda, V. T. Vasconcelos, and M. Kubo, Language primitives and type discipline for structured communication-based programming, ESOP'98, number 1381, 1998.
DOI : 10.1007/BFb0053567

URL : https://link.springer.com/content/pdf/10.1007%2FBFb0053567.pdf

K. Honda, N. Yoshida, and M. Carbone, Multiparty asynchronous session types, POPL, pp.273-284, 2008.
DOI : 10.1145/1328897.1328472

URL : http://www.doc.ic.ac.uk/~yoshida/multiparty/multiparty_full.pdf

H. Hüttel, I. Lanese, V. T. Vasconcelos, L. Caires, M. Carbone et al., Foundations of session types and behavioural contracts, ACM Comput. Surv, vol.49, issue.1, p.3, 2016.

S. Kremer and R. Künnemann, Automated analysis of security protocols with global state, Proc. of SP 2014, pp.163-178, 2014.
DOI : 10.3233/jcs-160556

URL : https://hal.archives-ouvertes.fr/hal-00955869

G. Lowe, Breaking and fixing the needham-schroeder public-key protocol using FDR. Software -Concepts and Tools, pp.93-102, 1996.
DOI : 10.1007/3-540-61042-1_43

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-61042-1_43.pdf

S. Meier, B. Schmidt, C. Cremers, and D. A. Basin, The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Proc. of CAV 2013, pp.696-701, 2013.
DOI : 10.1007/978-3-642-39799-8_48

D. Nantes and J. A. Pérez, Relating Process Languages for Security and Communication Correctness (Full Version), 2018.
DOI : 10.1007/978-3-319-92612-4_5

F. Pfenning, L. Caires, and B. Toninho, Proof-Carrying Code in a Session-Typed Process Calculus, Proc. of CPP 2011, pp.21-36, 2011.
DOI : 10.1145/2003476.2003499

URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=3706&context=compsci