Just fast keying in the pi calculus, ACM Transactions on Information and System Security (TISSEC), vol.10, issue.3, pp.1-59, 2007. ,
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.417-431, 2008. ,
DOI : 10.1109/SP.2008.12
A Secure Cryptographic Token Interface, 2009 22nd IEEE Computer Security Foundations Symposium, pp.141-153, 2009. ,
DOI : 10.1109/CSF.2009.7
A Generic Security API for Symmetric Key Management on Cryptographic Devices, Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS'09), pp.605-620, 2009. ,
DOI : 10.1109/CSFW.2001.930145
URL : https://hal.archives-ouvertes.fr/hal-00881072
Revoke and let live, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382293
URL : https://hal.archives-ouvertes.fr/hal-00732902
Defending the bank with a proof assistant, Proceedings of the 6th International Workshop on Issues in the Theory of Security (WITS'06), pp.87-98, 2006. ,
A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.41-47, 2002. ,
DOI : 10.1145/586110.586117
Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data, Lecture Notes in Computer Science, vol.5511, pp.92-106, 2009. ,
DOI : 10.1007/978-3-642-03459-6_7
SAM and key management functional presentation Available from http, 2010. ,
Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), pp.147-166, 1996. ,
DOI : 10.1007/3-540-61042-1_43
Verifying SeVeCom using set-based abstraction, 2011 7th International Wireless Communications and Mobile Computing Conference, pp.1164-1169, 2011. ,
DOI : 10.1109/IWCMC.2011.5982705
The kerberos network authentication service -rfc 4120 ,
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures, Journal of Automated Reasoning, vol.4, issue.1/2, pp.149-176, 2006. ,
DOI : 10.1007/s10817-005-9016-8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.9218
Secure on-board architecture specification ,
Keyrev: An effifcient key revocation scheme for wireless sensor networks, IEEE International Conference on Communications (ICC), pp.1260-1265, 2007. ,