M. Abadi and C. Fournet, Mobile values, new names, and secure communication, 28th Symposium on Principles of Programming Languages (POPL'01, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Abadi and R. M. Needham, Prudent engineering practice for cryptographic protocols, IEEE Transactions on Software Engineering, vol.22, issue.1, pp.6-15, 1996.
DOI : 10.1109/32.481513

R. Amadio and W. Charatonik, On Name Generation and Set-Based Analysis in the Dolev-Yao Model, 13th Int. Conference on Concurrency Theory (CON- CUR'02), 2002.
DOI : 10.1007/3-540-45694-5_33

M. Arapinis and M. Duflot, Bounding Messages for Free in Security??Protocols, 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), 2007.
DOI : 10.1007/978-3-540-77050-3_31

URL : https://hal.archives-ouvertes.fr/hal-01195943

M. Backes, C. Hritcu, and M. Maffei, Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008.
DOI : 10.1109/CSF.2008.26

M. Baudet, Deciding security of protocols against off-line guessing attacks, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05
DOI : 10.1145/1102120.1102125

B. Blanchet, M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), 2005.
DOI : 10.1109/LICS.2005.8

B. Blanchet and A. Podelski, Verification of cryptographic protocols: Tagging enforces termination, Foundations of Software Science and Computation Structures (FoSSaCS'03)

M. Bruso, K. Chatzikokolakis, and J. Hartog, Formal Verification of Privacy for RFID Systems, 2010 23rd IEEE Computer Security Foundations Symposium, 2010.
DOI : 10.1109/CSF.2010.13

]. R. Chadha, ¸. S. Ciobâc?, and S. Kremer, Automated verification of equivalence properties of cryptographic protocols, 21th European Symposium on Programming (ESOP'12)
URL : https://hal.archives-ouvertes.fr/inria-00632564

V. Cheval, H. Comon-lundh, and S. Delaune, Trace equivalence decision, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11
DOI : 10.1145/2046707.2046744

V. Cheval, V. Cortier, and S. Delaune, Deciding equivalence-based properties using constraint solving, Theoretical Computer Science, vol.492, pp.1-39, 2013.
DOI : 10.1016/j.tcs.2013.04.016

URL : https://hal.archives-ouvertes.fr/hal-00881060

R. Chrétien, V. Cortier, and S. Delaune, From security protocols to pushdown automata, 40th Int. Colloquium on Automata, Languages and Programming (ICALP'13), 2013.

J. Clark and J. Jacob, A survey of authentication protocol literature: Version 1.0, 1997.

H. Comon-lundh, V. Cortier, and E. Zalinescu, Deciding security properties for cryptographic protocols. application to key cycles, ACM Transactions on Computational Logic, vol.11, issue.2, 2010.
DOI : 10.1145/1656242.1656244

URL : https://hal.archives-ouvertes.fr/inria-00525775

V. Cortier and S. Delaune, Safely composing security protocols. Formal Methods in System Design, pp.1-36, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00157889

N. Dershowitz and J. Jouannaud, Rewrite Systems, 1990.
DOI : 10.1016/B978-0-444-88074-1.50011-1

J. D. Guttman and F. J. Thayer, Protocol independence through disjoint encryption, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 2000.
DOI : 10.1109/CSFW.2000.856923

J. Millen and V. Shmatikov, Constraint solving for bounded-process cryptographic protocol analysis, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, 2001.
DOI : 10.1145/501983.502007

R. Ramanujam and S. P. Suresh, Tagging Makes Secrecy Decidable with Unbounded Nonces as Well, 23rd Conference of Foundations of Software Technology and Theoretical Computer Science (FSTTCS'03), pp.363-374, 2003.
DOI : 10.1007/978-3-540-24597-1_31

A. Tiu and J. E. Dawson, Automating Open Bisimulation Checking for the Spi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, pp.307-321, 2010.
DOI : 10.1109/CSF.2010.28

A. Tiu, R. Goré, and J. E. Dawson, A proof theoretic analysis of intruder theories, Logical Methods in Computer Science, vol.6, issue.3, 2010.