In Journal of Computer Security, 2008-11-19, p. 573-636, joint work with Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, and James Leifer.
This full paper merges the results from the following two papers, provides the proofs, and includes additional details and examples.