Mobile Values, New Names, and Secure Communication, 28th ACM Symp. on Principles of Programming Languages (POPL'01, pp.104-115, 2001. ,
DOI : 10.1145/373243.360213
URL : https://hal.archives-ouvertes.fr/hal-01423924
StatVerif: Verification of Stateful Processes, 24th IEEE Computer Security Foundations Symposium (CSF'11, pp.33-47, 2011. ,
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, 17th International Conference on Computer Aided Verification (CAV'05), pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Asynchronous protocols for optimistic fair exchange, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.86-99, 1998. ,
DOI : 10.1109/SECPRI.1998.674826
Automated Symbolic Proofs of Observational Equivalence, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1144-1155, 2015. ,
DOI : 10.1145/2810103.2813662
URL : https://hal.archives-ouvertes.fr/hal-01337409
Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.331-340, 2005. ,
DOI : 10.1109/LICS.2005.8
An intruder model for verifying liveness in security protocols, Proceedings of the fourth ACM workshop on Formal methods in security , FMSE '06, pp.23-32, 2006. ,
DOI : 10.1145/1180337.1180340
Inductive methods and contract-signing protocols, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.176-185, 2001. ,
DOI : 10.1145/501983.502008
Formal analysis of multi-party contract signing, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., pp.39-83, 2006. ,
DOI : 10.1109/CSFW.2004.1310746
Automated verification of equivalence properties of cryptographic protocols, In: ACM Transactions on Computational Logic, vol.17, issue.4, 2016. ,
URL : https://hal.archives-ouvertes.fr/inria-00632564
Contract signing, optimism, and advantage, CONCUR 2003 ? Concurrency Theory, pp.366-382, 2003. ,
Revoke and let live, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.918-928, 2012. ,
DOI : 10.1145/2382196.2382293
URL : https://hal.archives-ouvertes.fr/hal-00732902
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, 20th Conference on Computer Aided Verification (CAV'08), pp.414-418, 2008. ,
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Foundations of Security Analysis and Design V, pp.1-50, 2009. ,
DOI : 10.1007/s10990-007-9000-6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.3197
Relations among Public Key Signature Systems, 1980. ,
Abuse-Free Optimistic Contract Signing, Advances in Cryptology?Crypto'99, pp.449-466, 1999. ,
DOI : 10.1007/3-540-48405-1_29
Security analysis of efficient (Un-) fair non-repudiation protocols, Formal Aspects of Computing, vol.17, issue.3, pp.260-276, 2005. ,
DOI : 10.1007/s00165-004-0055-4
Automated Analysis of Security Protocols with Global State, 35th IEEE Symposium on Security and Privacy, pp.163-178, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01351388
Automated analysis of security protocols with global state, Journal of Computer Security, vol.245, pp.583-616, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01351388
An Intensive Survey of Fair Nonrepudiation Protocols, Computer Communications, vol.2517, pp.1606-1621, 2002. ,
A Game-Based Verification of Non-repudiation and Fair Exchange Protocols, Journal of Computer Security, vol.113, pp.399-429, 2003. ,
DOI : 10.1007/3-540-44685-0_37
Game analysis of abuse-free contract signing, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.206-220, 2002. ,
DOI : 10.1109/CSFW.2002.1021817
Proving the Correctness of Multiprocess Programs, IEEE transactions on software engineering, pp.125-143, 1977. ,
DOI : 10.1109/TSE.1977.229904
Advancing automated security protocol verification, 2013. ,
ProVerif 1.88: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial, 2013. ,
Formal Analysis of Key-Exchange Protocols and Physical Protocols, 2012. ,
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012. ,
DOI : 10.1109/CSF.2012.25
The TAMARIN Prover for the Symbolic Analysis of Security Protocols, 25th International Conference on Computer Aided Verification (CAV'13), pp.696-701, 2013. ,
Formal analysis of a non-repudiation protocol, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), pp.54-65, 1998. ,
DOI : 10.1109/CSFW.1998.683155
Finite-state analysis of two contract signing protocols, Theoretical Computer Science, vol.283, issue.2, pp.419-450, 2002. ,
DOI : 10.1016/S0304-3975(01)00141-4