Mark D. Ryan & Ben Smyth (2011) *Applied pi calculus*. Chapter in Véronique Cortier & Steve Kremer (editors) Formal Models and Techniques for Analyzing Security Protocols, IOS Press.

- Applied pi calculus Extended version
- Buy: Applied pi calculus on Amazon.co.uk, Applied pi calculus on Amazon.com, Applied pi calculus on IOS
- Applied pi calculus Official version

The applied pi calculus is a language for modelling security protocols. It is an extension of the pi calculus, a language for studying concurrency and process interaction. This chapter presents the applied pi calculus in a tutorial style. It describes reachability, correspondence, and observational equivalence properties, with examples showing how to model secrecy, authentication, and privacy aspects of protocols.

@incollection{2011-Applied-pi-calculus, author = "Mark D. Ryan and Ben Smyth", title = "{Applied pi calculus}", year = "2011", booktitle = "Formal Models and Techniques for Analyzing Security Protocols", editor = "V\'eronique Cortier and Steve Kremer", publisher = "IOS Press", chapter = "6", doi = "10.3233/978-1-60750-714-7-112", }