Process calculi for the verification of security properties of communication protocols for Peer-to-Peer systems