The following publications are possibly variants of this publication:
- Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-CalculusAybek Mukhamedov, Mark Dermot Ryan. tissec, 13(4):41, 2010. [doi]
- Applied pi calculusMark Dermot Ryan, Ben Smyth. In VĂ©ronique Cortier, Steve Kremer, editors, Formal Models and Techniques for Analyzing Security Protocols. Volume 5 of Cryptology and Information Security Series, pages 112-142, IOS Press, 2011. [doi]
- Untraceability in the applied pi-calculusMyrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan. icitst 2009: 1-6 [doi]
- Stateful Applied Pi CalculusMyrto Arapinis, Jia Liu, Eike Ritter, Mark Ryan. post 2014: 22-41 [doi]
- Analysing the MUTE Anonymous File-Sharing System Using the Pi-CalculusTom Chothia. forte 2006: 115-130 [doi]