The applied pi calculus is a language for modelling security protocols. It is an extension of the pi calculus, a language for studying concurrency and process interaction. This chapter presents the applied pi calculus in a tutorial style. It describes reachability, correspondence, and observational equivalence properties, with examples showing how to model secrecy, authentication, and privacy aspects of protocols.
@incollection{2011-Applied-pi-calculus, author = "Mark D. Ryan and Ben Smyth", title = "{Applied pi calculus}", year = "2011", booktitle = "Formal Models and Techniques for Analyzing Security Protocols", editor = "V\'eronique Cortier and Steve Kremer", publisher = "IOS Press", chapter = "6", doi = "10.3233/978-1-60750-714-7-112", }