M. Abadi and C. Fournet, Mobile values, new names, and secure communication, POPL'01, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

N. Asokan and P. Ginzboorg, Key agreement in ad hoc networks, Computer Communications, vol.23, issue.17, pp.1627-1637, 2000.
DOI : 10.1016/S0140-3664(00)00249-8

M. Backes, S. Mödersheim, B. Pfitzmann, and L. Viganò, Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario, FoSSaCS'06, pp.428-445, 2006.
DOI : 10.1007/11690634_29

K. Bhargavan, C. Fournet, A. D. Gordon, and R. Pucella, TulaFale: A Security Tool for Web Services, FMCO'03, pp.197-222, 2004.
DOI : 10.1109/MIC.2003.1250585

B. Blanchet, Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009.
DOI : 10.3233/JCS-2009-0339

B. Blanchet and M. Paiola, Automatic verification of protocols with lists of unbounded length, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.573-584, 2013.
DOI : 10.1145/2508859.2516679

URL : https://hal.archives-ouvertes.fr/hal-00918849

A. Brown, B. Fox, S. Hada, B. Lamacchia, and H. Maruyama, SOAP security extensions: Digital signature

J. Bryans and S. Schneider, CSP, PVS and recursive authentication protocol, DIMACS Workshop on Formal Verification of Security Protocols, 1997.

N. Chridi, M. Turuani, and M. Rusinowitch, Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists, 2009 22nd IEEE Computer Security Foundations Symposium, pp.277-289, 2009.
DOI : 10.1109/CSF.2009.10

URL : https://hal.archives-ouvertes.fr/inria-00426919

D. Dolev and A. C. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, IT, issue.12, pp.29198-208, 1983.

E. Kleiner and A. W. Roscoe, On the Relationship Between Web Services Security and Traditional Protocols, MFPS 21, pp.583-603, 2006.
DOI : 10.1016/j.entcs.2005.11.074

R. Küsters and T. Truderung, On the Automatic Analysis of Recursive Security Protocols with XOR, STACS'07, pp.646-657, 2007.
DOI : 10.1007/978-3-540-70918-3_55

M. Paiola and B. Blanchet, Verification of security protocols with lists: from length one to unbounded length, LNCS, vol.7215, issue.12, pp.69-88, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00863387

C. Lawrence and . Paulson, Mechanized proofs for a recursive authentication protocol, CSFW'97, pp.84-95, 1997.

A. W. Roscoe and E. Kleiner, Web Services Security: a preliminary study using Casper and FDR, Automated Reasoning for Security Protocol Analysis, 2004.

T. Truderung, Selecting Theories and Recursive Protocols, CONCUR 2005, pp.217-232, 2005.
DOI : 10.1007/11539452_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.488.1561