M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proc. of the 28th ACM Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930138

B. Blanchet and A. Podelski, Verification of cryptographic protocols: Tagging enforces termination, Foundations of Software Science and Computation Structures (FoSSaCS'03), 2003.

V. Cheval, V. Cortier, and E. Le-morvan, secure refinements of communication channels. research report RR-8790, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01238094

S. Ciobâc?-a and V. Cortier, Protocol composition for arbitrary primitives, Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10), pp.322-336, 2010.

V. Cortier and S. Delaune, Safely composing security protocols. Formal Methods in System Design, pp.1-36, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00157889

A. Datta, A. Derek, J. C. Mitchell, and A. Roy, Protocol Composition Logic (PCL), Electronic Notes in Theoretical Computer Science, vol.172, pp.311-358, 2007.
DOI : 10.1016/j.entcs.2007.02.012

T. Dierks and E. Rescorla, The transport layer security (tls) protocol version 1.2 (rfc 5246), 2008.

T. Gibson-robinson, A. Kamil, and G. Lowe, Verifying layered security protocols, Journal of Computer Security, vol.23, issue.3, p.2015
DOI : 10.3233/JCS-150526

J. D. Guttman, Authentication tests and disjoint encryption: A design method for security protocols*, Journal of Computer Security, vol.12, issue.3-4, pp.3-4409, 2004.
DOI : 10.3233/JCS-2004-123-405

J. D. Guttman, Establishing and preserving protocol security goals, 13th Computer Security Foundations Workshop (CSFW'00), pp.203-267, 2000.
DOI : 10.3233/JCS-140499

B. Meier, C. Schmidt, D. Cremers, and . Basin, The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Computer Aided Verification, 25th International Conference, CAV 2013, pp.696-701, 2013.
DOI : 10.1007/978-3-642-39799-8_48

J. Meyer and . Schwenk, Lessons learned from previous ssl/tls attacks : A brief chronology of attacks and weaknesses, IACR Cryptology ePrint, 2013.

L. Moedersheim and . Viganò, Sufficient conditions for vertical composition of security protocols, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.435-446, 2014.
DOI : 10.1145/2590296.2590330

J. Pasupathinathan, H. Pieprzyk, J. Y. Wang, and . Cho, Formal analysis of card-based payment systems in mobile services. In Fourth Australian information security workshop, conferences in research and practise in information security, pp.213-220, 2006.

. Turuani, The CL-Atse Protocol Analyser, Term Rewriting and Applications -Proc. of RTA, pp.277-286, 2006.
DOI : 10.1007/11805618_21

URL : https://hal.archives-ouvertes.fr/inria-00103573