Mobile values, new names, and secure communication, Proc. of POPL'01, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Combining behavioural types with security analysis, Journal of Logical and Algebraic Methods in Programming, vol.84, issue.6, pp.763-780, 2015. ,
DOI : 10.1016/j.jlamp.2015.09.003
URL : https://hal.archives-ouvertes.fr/hal-01213201
Modeling and verifying security protocols with the applied pi calculus and proverif. Foundations and Trends in Privacy and Security, pp.1-135, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01423760
Typing access control and secure information flow in sessions, Information and Computation, vol.238, pp.68-105, 2014. ,
DOI : 10.1016/j.ic.2014.07.005
URL : https://hal.archives-ouvertes.fr/hal-01088782
A Gentle Introduction to Multiparty Asynchronous Session Types, Formal Methods for Multicore Programming, pp.146-178, 2015. ,
DOI : 10.1007/978-3-319-14128-2_3
URL : http://spiral.imperial.ac.uk/bitstream/10044/1/27022/2/gentle-introduction.pdf
Secure Implementations for Typed Session Abstractions, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.170-186, 2007. ,
DOI : 10.1109/CSF.2007.29
URL : https://ris.utwente.nl/ws/files/5387402/04271648.pdf
Formal Models and Techniques for Analyzing Security Protocols: A Tutorial, Foundations and Trends?? in Programming Languages, vol.1, issue.3, pp.151-267, 2014. ,
DOI : 10.1561/2500000001
URL : https://hal.archives-ouvertes.fr/hal-01090874
Abuse-Free Optimistic Contract Signing, Proc. of CRYPTO'99, pp.449-466, 1999. ,
DOI : 10.1007/3-540-48405-1_29
URL : http://www.mathmagic.cn/crypt1998-2003/papers/1666/16660449.pdf
Language primitives and type discipline for structured communication-based programming, ESOP'98, number 1381, 1998. ,
DOI : 10.1007/BFb0053567
URL : https://link.springer.com/content/pdf/10.1007%2FBFb0053567.pdf
Multiparty asynchronous session types, POPL, pp.273-284, 2008. ,
DOI : 10.1145/1328897.1328472
URL : http://www.doc.ic.ac.uk/~yoshida/multiparty/multiparty_full.pdf
Foundations of session types and behavioural contracts, ACM Comput. Surv, vol.49, issue.1, p.3, 2016. ,
Automated analysis of security protocols with global state, Proc. of SP 2014, pp.163-178, 2014. ,
DOI : 10.3233/jcs-160556
URL : https://hal.archives-ouvertes.fr/hal-00955869
Breaking and fixing the needham-schroeder public-key protocol using FDR. Software -Concepts and Tools, pp.93-102, 1996. ,
DOI : 10.1007/3-540-61042-1_43
URL : https://link.springer.com/content/pdf/10.1007%2F3-540-61042-1_43.pdf
The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Proc. of CAV 2013, pp.696-701, 2013. ,
DOI : 10.1007/978-3-642-39799-8_48
Relating Process Languages for Security and Communication Correctness (Full Version), 2018. ,
DOI : 10.1007/978-3-319-92612-4_5
Proof-Carrying Code in a Session-Typed Process Calculus, Proc. of CPP 2011, pp.21-36, 2011. ,
DOI : 10.1145/2003476.2003499
URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=3706&context=compsci