E. Amoroso, Fundamentals of Computer Security Technology, 1994.

H. R. Nielson, F. Nielson, and R. Vigo, A Calculus for Quality, 9th International Symposium on Formal Aspects of Component Software (FACS'12, pp.188-204, 2012.
DOI : 10.1007/978-3-642-35861-6_12

S. Mödersheim and L. Viganò, Secure Pseudonymous Channels, 14th European Symposium on Research in Computer Security (ESORICS'09, pp.337-354, 2009.
DOI : 10.1007/978-3-540-75227-1_6

L. C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security, vol.6, issue.1-2, pp.85-128, 1998.
DOI : 10.3233/JCS-1998-61-205

C. Weidenbach, Towards an Automatic Analysis of Security Protocols in First-Order Logic, 16th International Conference on Automated Deduction (CADE-16), pp.314-328, 1999.
DOI : 10.1007/3-540-48660-7_29

H. R. Nielson and F. Nielson, Flow Logic : A Multi-paradigmatic Approach In: The Essence of Computation, Complexity Analysis, Transformation. Essays Dedicated to Neil D. Jones. LNCS, vol.2566, pp.223-244, 2002.

B. Blanchet, Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009.
DOI : 10.3233/JCS-2009-0339

L. De-moura and N. Bjørner, Satisfiability modulo theories, Communications of the ACM, vol.54, issue.9, pp.69-77, 2011.
DOI : 10.1145/1995376.1995394

URL : https://hal.archives-ouvertes.fr/hal-01095009

R. Nieuwenhuis and A. Oliveras, On SAT Modulo Theories and Optimization Problems, Theory and Applications of Satisfiability Testing (SAT'06, pp.156-169, 2006.
DOI : 10.1007/11814948_18

A. Cimatti, A. Franzén, A. Griggio, R. Sebastiani, and C. Stenico, Satisfiability Modulo the Theory of Costs: Foundations and Applications, LNCS, vol.6015, pp.99-113, 2010.
DOI : 10.1007/978-3-642-12002-2_8

C. Meadows, A cost-based framework for analysis of denial of service in networks, Journal of Computer Security, vol.9, issue.1-2, pp.143-164, 2001.
DOI : 10.3233/JCS-2001-91-206

I. Dillig, T. Dillig, K. Mcmillan, and A. Aiken, Minimum Satisfying Assignments for SMT, Computer Aided Verification (CAV'12, pp.394-409, 2012.
DOI : 10.1007/978-3-642-31424-7_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.7373

M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012.
DOI : 10.1109/CSF.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

R. Vigo, The Cyber-Physical Attacker, LNCS, vol.7613, pp.347-356, 2012.
DOI : 10.1007/978-3-642-33675-1_31

V. Griffith and M. Jakobsson, Messin??? with Texas Deriving Mother???s Maiden Names Using Public Records, Applied Cryptography and Network Security, pp.91-103, 2005.
DOI : 10.1007/11496137_7

F. Nielson, H. R. Nielson, and R. R. Hansen, Validating firewalls using flow logics, Theoretical Computer Science, vol.283, issue.2, pp.381-418, 2002.
DOI : 10.1016/S0304-3975(01)00140-2

URL : http://doi.org/10.1016/s0304-3975(01)00140-2