Deciding knowledge in security protocols under equational theories, Theoretical Computer Science, vol.387, issue.12, pp.2-32, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00000554
Mobile values, new names, and secure communication, Proc. 28th ACM Symp. on Principles of Programming Languages (POPL'01), pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Statverif: Verification of stateful processes, Proc. 24th IEEE Computer Security Foundations Symposium (CSF'11), pp.33-47, 2011. ,
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proc. 17th International Conference on Computer Aided Verification (CAV'05), pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Formal analysis of SAML 2.0 web browser single sign-on, Proceedings of the 6th ACM workshop on Formal methods in security engineering, FMSE '08, pp.1-10, 2008. ,
DOI : 10.1145/1456396.1456397
Relating multiset rewriting and process algebras for security protocol analysis, Journal of Computer Security, vol.13, issue.1, pp.3-47, 2005. ,
DOI : 10.3233/JCS-2005-13102
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001. ,
DOI : 10.1109/CSFW.2001.930138
ProVerif 1.88: Automatic Cryptographic Protocol Verifier, 2013. ,
API-level attacks on embedded systems, Computer, vol.34, issue.10, pp.67-75, 2001. ,
DOI : 10.1109/2.955101
Attacking and fixing PKCS#11 security tokens, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.260-269, 2010. ,
DOI : 10.1145/1866307.1866337
Automated analysis of security protocols with global state ,
URL : https://hal.archives-ouvertes.fr/hal-01351388
Formal security analysis of PKCS#11 and proprietary extensions, Journal of Computer Security, vol.18, issue.6, pp.1211-1245, 2010. ,
DOI : 10.3233/JCS-2009-0394
Formal Analysis of Protocols Based on TPM State Registers, 2011 IEEE 24th Computer Security Foundations Symposium, pp.66-82, 2011. ,
DOI : 10.1109/CSF.2011.12
URL : https://hal.archives-ouvertes.fr/inria-00636747
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Foundations of Security Analysis and Design V, pp.1-50, 2009. ,
DOI : 10.1007/s10990-007-9000-6
Reasoning with Past to Prove PKCS#11 Keys Secure, Proc. 7th International Workshop on Formal Aspects in Security and Trust (FAST'10), pp.96-110, 2010. ,
DOI : 10.1007/978-3-642-03459-6_7
Abuse-Free Optimistic Contract Signing, Advances in Cryptology?Crypto'99, pp.449-466, 1999. ,
DOI : 10.1007/3-540-48405-1_29
State and Progress in Strand Spaces: Proving Fair Exchange, Journal of Automated Reasoning, vol.14, issue.5, pp.159-195, 2012. ,
DOI : 10.1007/s10817-010-9202-1
Applying protocol analysis to security device interfaces, IEEE Security & Privacy Magazine, vol.4, issue.4, pp.84-87, 2006. ,
DOI : 10.1109/MSP.2006.85
Automated analysis of security protocols with global state, Proc. 35th IEEE Symposium on Security and Privacy (S&P'14), pp.163-178, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01351388
Automated backward analysis of PKCS#11 v2, Proc. 4th Conference on Principles of Security and Trust (POST'15), pp.219-238, 2015. ,
YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM, Proc. 8th Workshop on Security and Trust Management (STM'12), pp.257-272, 2012. ,
DOI : 10.1007/978-3-642-38004-4_17
An automatic search for security flaws in key management schemes, Computers & Security, vol.11, issue.1, pp.75-89, 1992. ,
DOI : 10.1016/0167-4048(92)90222-D
Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, Proc. 2nd International Workshop on Tools and Algorithms for Construction and Analysis of Systems (TACAS'96), volume 1055 of LNCS, pp.147-166, 1996. ,
DOI : 10.1007/3-540-61042-1_43
Abstraction by set-membership: verifying security protocols and web services with databases, Proc. 17th ACM Conference on Computer and Communications Security (CCS'10), pp.351-360, 2010. ,
Vérification automatique de protocoles de sécurité avec mémoire globale et boucles, 2014. ,
A Hybrid Analysis for Security Protocols with State, Proc. 11th International Conference on Integrated Formal Methods (IFM'14), pp.272-287, 2014. ,
DOI : 10.1007/978-3-319-10181-1_17
Cryptographic Token Interface Standard. RSA Security Inc., v2, 2004. ,
Formal Analysis of Key-Exchange Protocols and Physical Protocols, 2012. ,
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012. ,
DOI : 10.1109/CSF.2012.25
The tamarin prover for the symbolic analysis of security protocols, Proc. 25th International Conference on Computer Aided Verification (CAV'13), pp.696-701, 2013. ,
Automated Verification of Group Key Agreement Protocols, 2014 IEEE Symposium on Security and Privacy, pp.179-194, 2014. ,
DOI : 10.1109/SP.2014.19
Formal Analysis of Enhanced Authorization in the TPM 2.0, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pp.273-284, 2015. ,
DOI : 10.1145/2714576.2714610
Strand spaces: proving security protocols correct, Journal of Computer Security, vol.7, issue.2-3, pp.191-230, 1999. ,
DOI : 10.3233/JCS-1999-72-304
TPM Specification version 1.2. Parts 1?3, revision 103, 2007. ,
Yubico customer list, 2014. URL https://www.yubico.com/about/reference-customers/. Accessed: Do 13, p.3334, 201408-11. ,