M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proceedings of the 28th Symposium on Principles of Programming Languages (POPL'01, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Arapinis, T. Chothia, E. Ritter, and M. Ryan, Analysing Unlinkability and Anonymity Using the Applied Pi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, pp.107-121, 2010.
DOI : 10.1109/CSF.2010.15

A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proceedings of the 17th International Conference on Computer Aided Verification, pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

M. Backes, M. Maffei, and D. Unruh, Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008.
DOI : 10.1109/SP.2008.23

D. Baelde, S. Delaune, and L. Hirschi, Partial order reduction for security protocols

B. Blanchet, Proverif 1.91. http://prosecco.gforge.inria.fr See files in directory, As downloaded on October 1st, 2015.

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930138

B. Blanchet, An automatic security protocol verifier based on resolution theorem proving (invited tutorial), Proceedings of the 20th International Conference on Automated Deduction (CADE-20), 2005.

B. Blanchet, M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008.
DOI : 10.1109/LICS.2005.8

R. Chadha, S. ¸. Ciobâc?, and S. Kremer, Automated Verification of Equivalence Properties of Cryptographic Protocols, Programming Languages and Systems ? Proceedings of the 21th European Symposium on Programming (ESOP'12), pp.108-127, 2012.
DOI : 10.1007/978-3-642-28869-2_6

URL : https://hal.archives-ouvertes.fr/inria-00632564

V. Cheval, V. Cortier, and S. Delaune, Deciding equivalence-based properties using constraint solving, Theoretical Computer Science, vol.492, pp.1-39
DOI : 10.1016/j.tcs.2013.04.016

URL : https://hal.archives-ouvertes.fr/hal-00881060

T. Chothia and V. Smirnov, A Traceability Attack against e-Passports, Proceedings of the 14th International Conference on Financial Cryptography and Data Security, 2010.
DOI : 10.1007/978-3-642-14577-3_5

R. Chrétien, V. Cortier, and S. Delaune, From Security Protocols to Pushdown Automata, Proceedings of the 40th International Colloquium on Automata, Languages and Programming (ICALP'13), pp.137-149, 2013.
DOI : 10.1007/978-3-642-39212-2_15

R. Chrétien, V. Cortier, and S. Delaune, Checking Trace Equivalence: How to Get Rid of Nonces?, Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15), 2015.
DOI : 10.1007/978-3-319-24177-7_12

H. Comon-lundh and V. Cortier, Security properties: two agents are sufficient, Science of Computer Programming, vol.50, issue.1-3, pp.51-71, 2004.
DOI : 10.1016/j.scico.2003.12.002

URL : https://hal.archives-ouvertes.fr/inria-00099981

H. Comon-lundh and V. Cortier, Computational soundness of observational equivalence, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.109-118, 2008.
DOI : 10.1145/1455770.1455786

URL : https://hal.archives-ouvertes.fr/inria-00323199

V. Cortier, A. Dallon, and S. Delaune, Bounding the Number of Agents, for??Equivalence Too, 2016.
DOI : 10.1145/358722.358740

URL : https://hal.archives-ouvertes.fr/hal-01361286

C. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Computer Aided Verification, 20th International Conference, pp.414-418, 2008.
DOI : 10.1007/978-3-540-70545-1_38

S. Delaune, S. Kremer, and M. D. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2008.
DOI : 10.3233/JCS-2009-0340

D. Denning and G. Sacco, Timestamps in key distribution protocols, Communications of the ACM, vol.24, issue.8, pp.533-535, 1981.
DOI : 10.1145/358722.358740

B. Schmidt, S. Meier, C. Cremers, and D. Basin, Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012.
DOI : 10.1109/CSF.2012.25