Mobile values, new names, and secure communication, Proceedings of the 28th Symposium on Principles of Programming Languages (POPL'01, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, pp.107-121, 2010. ,
DOI : 10.1109/CSF.2010.15
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proceedings of the 17th International Conference on Computer Aided Verification, pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008. ,
DOI : 10.1109/SP.2008.23
Partial order reduction for security protocols ,
Proverif 1.91. http://prosecco.gforge.inria.fr See files in directory, As downloaded on October 1st, 2015. ,
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930138
An automatic security protocol verifier based on resolution theorem proving (invited tutorial), Proceedings of the 20th International Conference on Automated Deduction (CADE-20), 2005. ,
Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008. ,
DOI : 10.1109/LICS.2005.8
Automated Verification of Equivalence Properties of Cryptographic Protocols, Programming Languages and Systems ? Proceedings of the 21th European Symposium on Programming (ESOP'12), pp.108-127, 2012. ,
DOI : 10.1007/978-3-642-28869-2_6
URL : https://hal.archives-ouvertes.fr/inria-00632564
Deciding equivalence-based properties using constraint solving, Theoretical Computer Science, vol.492, pp.1-39 ,
DOI : 10.1016/j.tcs.2013.04.016
URL : https://hal.archives-ouvertes.fr/hal-00881060
A Traceability Attack against e-Passports, Proceedings of the 14th International Conference on Financial Cryptography and Data Security, 2010. ,
DOI : 10.1007/978-3-642-14577-3_5
From Security Protocols to Pushdown Automata, Proceedings of the 40th International Colloquium on Automata, Languages and Programming (ICALP'13), pp.137-149, 2013. ,
DOI : 10.1007/978-3-642-39212-2_15
Checking Trace Equivalence: How to Get Rid of Nonces?, Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15), 2015. ,
DOI : 10.1007/978-3-319-24177-7_12
Security properties: two agents are sufficient, Science of Computer Programming, vol.50, issue.1-3, pp.51-71, 2004. ,
DOI : 10.1016/j.scico.2003.12.002
URL : https://hal.archives-ouvertes.fr/inria-00099981
Computational soundness of observational equivalence, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.109-118, 2008. ,
DOI : 10.1145/1455770.1455786
URL : https://hal.archives-ouvertes.fr/inria-00323199
Bounding the Number of Agents, for??Equivalence Too, 2016. ,
DOI : 10.1145/358722.358740
URL : https://hal.archives-ouvertes.fr/hal-01361286
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Computer Aided Verification, 20th International Conference, pp.414-418, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2008. ,
DOI : 10.3233/JCS-2009-0340
Timestamps in key distribution protocols, Communications of the ACM, vol.24, issue.8, pp.533-535, 1981. ,
DOI : 10.1145/358722.358740
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012. ,
DOI : 10.1109/CSF.2012.25