M. Abadi, B. Blanchet, and C. Fournet, Just fast keying in the pi calculus, ACM Transactions on Information and System Security (TISSEC), vol.10, issue.3, pp.1-59, 2007.

B. Blanchet and A. Chaudhuri, Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.417-431, 2008.
DOI : 10.1109/SP.2008.12

C. Cachin and N. Chandran, A Secure Cryptographic Token Interface, 2009 22nd IEEE Computer Security Foundations Symposium, pp.141-153, 2009.
DOI : 10.1109/CSF.2009.7

V. Cortier and G. Steel, A Generic Security API for Symmetric Key Management on Cryptographic Devices, Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS'09), pp.605-620, 2009.
DOI : 10.1109/CSFW.2001.930145

URL : https://hal.archives-ouvertes.fr/hal-00881072

V. Cortier, G. Steel, and C. Wiedling, Revoke and let live, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382293

URL : https://hal.archives-ouvertes.fr/hal-00732902

J. Courant and J. Monin, Defending the bank with a proof assistant, Proceedings of the 6th International Workshop on Issues in the Theory of Security (WITS'06), pp.87-98, 2006.

L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.41-47, 2002.
DOI : 10.1145/586110.586117

S. Fröschle and G. Steel, Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data, Lecture Notes in Computer Science, vol.5511, pp.92-106, 2009.
DOI : 10.1007/978-3-642-03459-6_7

F. Levy, SAM and key management functional presentation Available from http, 2010.

G. Lowe, Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), pp.147-166, 1996.
DOI : 10.1007/3-540-61042-1_43

S. Mödersheim and P. Modesti, Verifying SeVeCom using set-based abstraction, 2011 7th International Wireless Communications and Mobile Computing Conference, pp.1164-1169, 2011.
DOI : 10.1109/IWCMC.2011.5982705

C. Neuman, T. Yu, S. Hartman, and K. Raeburn, The kerberos network authentication service -rfc 4120

G. Steel and A. Bundy, Attacking Group Protocols by Refuting Incorrect Inductive Conjectures, Journal of Automated Reasoning, vol.4, issue.1/2, pp.149-176, 2006.
DOI : 10.1007/s10817-005-9016-8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.9218

]. B. Weyl, Secure on-board architecture specification

X. Z. Yong-wan and B. Ramamurthy, Keyrev: An effifcient key revocation scheme for wireless sensor networks, IEEE International Conference on Communications (ICC), pp.1260-1265, 2007.