Mark Dermot Ryan, Ben Smyth. Applied pi calculus. In Véronique Cortier, Steve Kremer, editors, Formal Models and Techniques for Analyzing Security Protocols. Volume 5 of Cryptology and Information Security Series, pages 112-142, IOS Press, 2011. [doi]
@incollection{RyanS11, title = {Applied pi calculus}, author = {Mark Dermot Ryan and Ben Smyth}, year = {2011}, doi = {10.3233/978-1-60750-714-7-112}, url = {https://doi.org/10.3233/978-1-60750-714-7-112}, researchr = {https://researchr.org/publication/RyanS11}, cites = {0}, citedby = {0}, pages = {112-142}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, editor = {Véronique Cortier and Steve Kremer}, volume = {5}, series = {Cryptology and Information Security Series}, publisher = {IOS Press}, isbn = {978-1-60750-714-7}, }