References

  1. Martín Abadi & Cédric Fournet (2001): Mobile Values, New Names, and Secure Communication. In: Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '01. ACM Press, New York, New York, USA, pp. 104–115, doi:10.1145/360204.360213.
  2. Charles H. Bennett & Gilles Brassard (1984): Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179.
  3. Timothy A. S. Davidson (2012): Formal verification techniques using quantum process calculus. Phd thesis. University of Warwick.
  4. Timothy A. S. Davidson, Simon J. Gay, Rajagopal Nagarajan & Ittoop Vergheese Puthoor (2012): Analysis of a Quantum Error Correcting Code using Quantum Process Calculus. Electronic Proceedings in Theoretical Computer Science 95, pp. 67–80, doi:10.4204/EPTCS.95.7.
  5. Yuxin Deng & Yuan Feng (2012): Open Bisimulation for Quantum Processes. In: Theoretical Computer Science, Lecture Notes in Computer Science 7604. Springer Berlin Heidelberg, pp. 119–133, doi:10.1007/978-3-642-33475-7_9.
  6. Yuan Feng, Runyao Duan, Zhengfeng Ji & Mingsheng Ying (2007): Probabilistic bisimulations for quantum processes. Information and Computation 205(11), pp. 1608–1639, doi:10.1016/j.ic.2007.08.001.
  7. Yuan Feng, Runyao Duan & Mingsheng Ying (2012): Bisimulation for Quantum Processes. ACM Transactions on Programming Languages and Systems 34(4), pp. 17:1–17:43, doi:10.1145/2400676.2400680.
  8. Simon J. Gay & Rajagopal Nagarajan (2005): Communicating Quantum Processes. In: Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '05. ACM Press, New York, New York, USA, pp. 145–157, doi:10.1145/1040305.1040318.
  9. Jean Goubault-larrecq, Catuscia Palamidessi & Angelo Troina (2007): A Probabilistic Applied Pi-Calculus. In: Programming Languages and Systems, Lecture Notes in Computer Science 4807. Springer Berlin Heidelberg, pp. 175–190, doi:10.1007/978-3-540-76637-7_12.
  10. Philippe Jorrand & Marie Lalire (2004): Toward a Quantum Process Algebra. In: Proceedings of the first conference on computing frontiers on Computing frontiers - CF'04. ACM Press, New York, New York, USA, pp. 111–119, doi:10.1145/977091.977108.
  11. Takahiro Kubota (2011): Formalization and Automation of Unconditional Security Proof of QKD. Master's thesis. University of Tokyo.
  12. Takahiro Kubota, Yoshihiko Kakutani, Go Kato, Yasuhito Kawano & Hideki Sakurada (2012): Application of a Process Calculus to Security Proofs of Quantum Protocols. In: Proceedings of Foundations of Computer Science in WORLDCOMP, pp. 141–147. Available at http://worldcomp-proceedings.com/proc/p2012/FCS.html.
  13. Peter W. Shor & John Preskill (2000): Simple Proof of Security of the BB84 Quantum Key Distribution Protocol. Physical Review Letters 85(2), pp. 441–444, doi:10.1103/PhysRevLett.85.441.
  14. Mingsheng Ying, Yuan Feng, Runyao Duan & Zhengfeng Ji (2009): An Algebra of Quantum Processes. ACM Transactions on Computational Logic 10(3), pp. 19:1–19:36, doi:10.1145/1507244.1507249.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org