M. Abadi and C. Fournet, Mobile Values, New Names, and Secure Communication, 28th ACM Symp. on Principles of Programming Languages (POPL'01, pp.104-115, 2001.
DOI : 10.1145/373243.360213

URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Arapinis, E. Ritter, and M. Ryan, StatVerif: Verification of Stateful Processes, 24th IEEE Computer Security Foundations Symposium (CSF'11, pp.33-47, 2011.

A. Armando, The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, 17th International Conference on Computer Aided Verification (CAV'05), pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

N. Asokan, V. Shoup, and M. Waidner, Asynchronous protocols for optimistic fair exchange, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.86-99, 1998.
DOI : 10.1109/SECPRI.1998.674826

D. A. Basin, J. Dreier, and R. Sasse, Automated Symbolic Proofs of Observational Equivalence, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1144-1155, 2015.
DOI : 10.1145/2810103.2813662

URL : https://hal.archives-ouvertes.fr/hal-01337409

B. Blanchet, M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.331-340, 2005.
DOI : 10.1109/LICS.2005.8

J. Cederquist and M. T. Dashti, An intruder model for verifying liveness in security protocols, Proceedings of the fourth ACM workshop on Formal methods in security , FMSE '06, pp.23-32, 2006.
DOI : 10.1145/1180337.1180340

R. Chadha, M. Kanovich, and A. Scedrov, Inductive methods and contract-signing protocols, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.176-185, 2001.
DOI : 10.1145/501983.502008

R. Chadha, S. Kremer, and A. Scedrov, Formal analysis of multi-party contract signing, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., pp.39-83, 2006.
DOI : 10.1109/CSFW.2004.1310746

R. Chadha, Automated verification of equivalence properties of cryptographic protocols, In: ACM Transactions on Computational Logic, vol.17, issue.4, 2016.
URL : https://hal.archives-ouvertes.fr/inria-00632564

R. Chadha, Contract signing, optimism, and advantage, CONCUR 2003 ? Concurrency Theory, pp.366-382, 2003.

V. Cortier, G. Steel, and C. Wiedling, Revoke and let live, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.918-928, 2012.
DOI : 10.1145/2382196.2382293

URL : https://hal.archives-ouvertes.fr/hal-00732902

J. F. Cas and . Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, 20th Conference on Computer Aided Verification (CAV'08), pp.414-418, 2008.

S. Escobar, C. Meadows, and J. Meseguer, Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Foundations of Security Analysis and Design V, pp.1-50, 2009.
DOI : 10.1007/s10990-007-9000-6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Even and Y. Yacobi, Relations among Public Key Signature Systems, 1980.

J. A. Garay, M. Jakobsson, and P. D. Mackenzie, Abuse-Free Optimistic Contract Signing, Advances in Cryptology?Crypto'99, pp.449-466, 1999.
DOI : 10.1007/3-540-48405-1_29

S. Gürgens and C. Rudolph, Security analysis of efficient (Un-) fair non-repudiation protocols, Formal Aspects of Computing, vol.17, issue.3, pp.260-276, 2005.
DOI : 10.1007/s00165-004-0055-4

S. Kremer and R. Künnemann, Automated Analysis of Security Protocols with Global State, 35th IEEE Symposium on Security and Privacy, pp.163-178, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01351388

S. Kremer and R. Künnemann, Automated analysis of security protocols with global state, Journal of Computer Security, vol.245, pp.583-616, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01351388

S. Kremer, O. Markowitch, and J. Zhou, An Intensive Survey of Fair Nonrepudiation Protocols, Computer Communications, vol.2517, pp.1606-1621, 2002.

S. Kremer and J. Raskin, A Game-Based Verification of Non-repudiation and Fair Exchange Protocols, Journal of Computer Security, vol.113, pp.399-429, 2003.
DOI : 10.1007/3-540-44685-0_37

S. Kremer and J. Raskin, Game analysis of abuse-free contract signing, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.206-220, 2002.
DOI : 10.1109/CSFW.2002.1021817

L. Lamport, Proving the Correctness of Multiprocess Programs, IEEE transactions on software engineering, pp.125-143, 1977.
DOI : 10.1109/TSE.1977.229904

S. Meier, Advancing automated security protocol verification, 2013.

B. Blanchet, B. Smyth, and V. Cheval, ProVerif 1.88: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial, 2013.

B. Schmidt, Formal Analysis of Key-Exchange Protocols and Physical Protocols, 2012.

B. Schmidt, Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012.
DOI : 10.1109/CSF.2012.25

B. Schmidt, The TAMARIN Prover for the Symbolic Analysis of Security Protocols, 25th International Conference on Computer Aided Verification (CAV'13), pp.696-701, 2013.

S. Schneider, Formal analysis of a non-repudiation protocol, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), pp.54-65, 1998.
DOI : 10.1109/CSFW.1998.683155

V. Shmatikov and J. C. Mitchell, Finite-state analysis of two contract signing protocols, Theoretical Computer Science, vol.283, issue.2, pp.419-450, 2002.
DOI : 10.1016/S0304-3975(01)00141-4