Luca Cardelli, Giorgio Ghelli & Andrew D. Gordon (2005):
Secrecy and group creation.
Inf. Comput. 196(2),
pp. 127–155,
doi:10.1016/j.ic.2004.08.003.
Silvia Crafa & Sabina Rossi (2007):
Controlling information release in the pi-calculus.
Inf. Comput. 205(8),
pp. 1235–1273,
doi:10.1016/j.ic.2007.01.001.
Cédric Fournet & Georges Gonthier (1996):
The Reflexive CHAM and the Join-Calculus.
In: Hans-Juergen Boehm & Guy L. Steele Jr.: Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Papers Presented at the Symposium, St. Petersburg Beach, Florida, USA, January 21-24, 1996.
ACM Press,
pp. 372–385,
doi:10.1145/237721.237805.
Simon J. Gay & Malcolm Hole (2005):
Subtyping for session types in the pi calculus.
Acta Inf. 42(2-3),
pp. 191–225,
doi:10.1007/s00236-005-0177-z.
Marco Giunti, Catuscia Palamidessi & Frank D. Valencia (2012):
Hide and New in the Pi-Calculus.
In: Bas Luttik & Michel A. Reniers: Proceedings Combined 19th International Workshop on Expressiveness in Concurrency and 9th Workshop on Structured Operational Semantics, EXPRESS/SOS 2012, Newcastle upon Tyne, UK, September 3, 2012.,
EPTCS 89,
pp. 65–79,
doi:10.4204/EPTCS.89.6.
Daniele Gorla (2010):
Towards a unified approach to encodability and separation results for process calculi.
Inf. Comput. 208(9),
pp. 1031–1053,
doi:10.1016/j.ic.2010.05.002.
Matthew Hennessy (2005):
The security pi-calculus and non-interference.
J. Log. Algebr. Program. 63(1),
pp. 3–34,
doi:10.1016/j.jlap.2004.01.003.
Kohei Honda & Mario Tokoro (1991):
An Object Calculus for Asynchronous Communication.
In: Pierre America: ECOOP'91 European Conference on Object-Oriented Programming, Geneva, Switzerland, July 15-19, 1991, Proceedings,
Lecture Notes in Computer Science 512.
Springer,
pp. 133–147,
doi:10.1007/BFb0057019.
Kohei Honda, Vasco Thudichum Vasconcelos & Makoto Kubo (1998):
Language Primitives and Type Discipline for Structured Communication-Based Programming.
In: Chris Hankin: Programming Languages and Systems - ESOP'98, 7th European Symposium on Programming, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'98, Lisbon, Portugal, March 28 - April 4, 1998, Proceedings,
Lecture Notes in Computer Science 1381.
Springer,
pp. 122–138,
doi:10.1007/BFb0053567.
Dimitrios Kouzapas & Anna Philippou (2017):
Privacy by typing in the π-calculus.
Logical Methods in Computer Science 13(4),
pp. 1–42,
doi:10.23638/LMCS-13(4:27)2017.
Massimo Merro & Davide Sangiorgi (2004):
On asynchrony in name-passing calculi.
Mathematical Structures in Computer Science 14(5),
pp. 715–767,
doi:10.1017/S0960129504004323.
Robin Milner (1980):
A Calculus of Communicating Systems.
Lecture Notes in Computer Science 92.
Springer,
doi:10.1007/3-540-10235-3.
Robin Milner (1992):
The Polyadic Pi-calculus (Abstract).
In: Rance Cleaveland: CONCUR '92, Third International Conference on Concurrency Theory, Stony Brook, NY, USA, August 24-27, 1992, Proceedings,
Lecture Notes in Computer Science 630.
Springer,
pp. 1,
doi:10.1007/BFb0084778.
Davide Sangiorgi (1996):
pi-Calculus, Internal Mobility, and Agent-Passing Calculi.
Theor. Comput. Sci. 167(1&2),
pp. 235–274,
doi:10.1016/0304-3975(96)00075-8.
Davide Sangiorgi & David Walker (2001):
The Pi-Calculus - a theory of mobile processes.
Cambridge University Press.
Daniel J Solove (2005):
A taxonomy of privacy.
U. Pa. L. Rev. 154,
pp. 477,
doi:10.2307/40041279.
Michael Carl Tschantz & Jeannette M. Wing (2009):
Formal Methods for Privacy.
In: Ana Cavalcanti & Dennis Dams: FM 2009: Formal Methods, Second World Congress, Eindhoven, The Netherlands, November 2-6, 2009. Proceedings,
Lecture Notes in Computer Science 5850.
Springer,
pp. 1–15,
doi:10.1007/978-3-642-05089-3_1.
Vasco T. Vasconcelos (2012):
Fundamentals of session types.
Inf. Comput. 217,
pp. 52–70,
doi:10.1016/j.ic.2012.05.002.
José-Luis Vivas & Nobuko Yoshida (2002):
Dynamic Channel Screening in the Higher Order pi-Calculus.
Electr. Notes Theor. Comput. Sci. 66(3),
pp. 170–184,
doi:10.1016/S1571-0661(04)80421-3.
Alan F Westin (2003):
Social and political dimensions of privacy.
Journal of social issues 59(2),
pp. 431–453,
doi:10.1111/1540-4560.00072.