M. Abadi, A. D. Gordon, G. L. Boudolclm00-]-g, J. J. Cattani, R. Leifer et al., A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.36-47, 1978.
DOI : 10.1145/266420.266432

J. J. Leiferlei02-]-j, . J. Leiferlm00-]-j, R. Leifer, and . Milner, Operational congruences for reactive systems Available in revised form as Synthesising labelled transitions and operational congruences in reactive systems, part 2 Submitted for publication Available from http://pauillac.inria.fr/?leifer Deriving bisimulation congruences for reactive systems, {3} [Lév78] J.-J. Lévy. Réductions correctes et optimales dans le lambda calcul CONCUR 2000 -Concurrency Theory, 11th International Conference Proceedings , volume 1877 of Lecture Notes in Computer Science, pp.48-56, 1978.

]. R. Springer-verlagmil92, ]. F. Milnermil96, ]. R. Moorempw89, J. Milner, D. Parrow et al., Categories for the Working Mathematician A Calculus of Communicating Systems Functions as processes Calculi for interaction Bigraphical reactive systems: basic theory Available from http://www.cl.cam.ac.uk/?rm135 Gedanken-experiments on sequential machines A calculus of mobile processes, parts I and II A calculus of mobile processes, parts I and II The inductive approach to verifying cryptographic protocols Call-by-name, call-by-value, and the ?-calculus Roscoe. Model-checking CSP, Automata Studies {6} [MS92] R. Milner and D. Sangiorgi. Barbed bisimulation. In Automata, Languages and Programming, 19th International Colloquium, ICALP '92 Proceedings, volume 623 of Lecture Notes in Computer Science {15} [Par81] D. Park. Concurrency and automata on infinite sequences Proc. 5th GI Conference {20} [Plo81] G. D. Plotkin. A structural approach to operational semantics {5} [Rei85] W. Reisig. Petri Nets: An IntroductionSew98] P. Sewell. Global/local subtyping and capability inference for a distributed picalculus Automata, Languages and Programming, 25th International Colloquium , ICALP '98 Proceedings, volume 1443 of Lecture Notes in Computer Science, pp.16-147, 1956.

P. Sewellsv99-]-p, J. Sewell, ]. Vitek, D. Sangiorgi, ]. Walker et al., Secure compositions of insecure components Secure composition of untrusted code: wrappers and causality types The ?-calculus: a Theory of Mobile Processes Towards a mathematical operational semantics Models for concurrency, Proc. 12th Computer Security Foundations Workshop Proc. 13th Computer Security Foundations Workshop {39} [SW01 12th Annual IEEE Symposium on Logic in Computer Science Handbook of Logic in Computer Science {4} INRIA Unité de recherche INRIA Rocquencourt Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex (France) Unité de recherche INRIA Lorraine : LORIA, Technopôle de Nancy-Brabois -Campus scienti£que 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l'Europe -38330 Montbonnot-St, pp.35-42, 1995.