Mobile values, new names, and secure communication, POPL'01, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Key agreement in ad hoc networks, Computer Communications, vol.23, issue.17, pp.1627-1637, 2000. ,
DOI : 10.1016/S0140-3664(00)00249-8
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario, FoSSaCS'06, pp.428-445, 2006. ,
DOI : 10.1007/11690634_29
TulaFale: A Security Tool for Web Services, FMCO'03, pp.197-222, 2004. ,
DOI : 10.1109/MIC.2003.1250585
Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009. ,
DOI : 10.3233/JCS-2009-0339
Automatic verification of protocols with lists of unbounded length, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.573-584, 2013. ,
DOI : 10.1145/2508859.2516679
URL : https://hal.archives-ouvertes.fr/hal-00918849
SOAP security extensions: Digital signature ,
CSP, PVS and recursive authentication protocol, DIMACS Workshop on Formal Verification of Security Protocols, 1997. ,
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists, 2009 22nd IEEE Computer Security Foundations Symposium, pp.277-289, 2009. ,
DOI : 10.1109/CSF.2009.10
URL : https://hal.archives-ouvertes.fr/inria-00426919
On the security of public key protocols, IEEE Transactions on Information Theory, IT, issue.12, pp.29198-208, 1983. ,
On the Relationship Between Web Services Security and Traditional Protocols, MFPS 21, pp.583-603, 2006. ,
DOI : 10.1016/j.entcs.2005.11.074
On the Automatic Analysis of Recursive Security Protocols with XOR, STACS'07, pp.646-657, 2007. ,
DOI : 10.1007/978-3-540-70918-3_55
Verification of security protocols with lists: from length one to unbounded length, LNCS, vol.7215, issue.12, pp.69-88, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00863387
Mechanized proofs for a recursive authentication protocol, CSFW'97, pp.84-95, 1997. ,
Web Services Security: a preliminary study using Casper and FDR, Automated Reasoning for Security Protocol Analysis, 2004. ,
Selecting Theories and Recursive Protocols, CONCUR 2005, pp.217-232, 2005. ,
DOI : 10.1007/11539452_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.488.1561