Helios: Web-based open-audit voting, Proceedings of the 17th USENIX Security Symposium, pp.335-348, 2008. ,
Intruders with Caps, Proceedings of the 18th International Conference on Term Rewriting and Applications. pp. 20?35. RTA'07, 2007. ,
DOI : 10.1007/978-3-540-73449-9_4
URL : https://hal.archives-ouvertes.fr/hal-00468721
StatVerif: Verification of stateful processes, Proc. 24th IEEE Computer Security Foundations Symposium (CSF'11, pp.33-47, 2011. ,
DOI : 10.3233/jcs-140501
URL : http://www.cs.bham.ac.uk/%7Emdr/research/papers/pdf/11-state-appi.pdf
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Know Your Enemy, ACM Transactions on Information and System Security, vol.17, issue.2, pp.1-7, 2014. ,
DOI : 10.1145/2658996
Automated Symbolic Proofs of Observational Equivalence, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015. ,
DOI : 10.1007/978-3-540-79966-5_1
URL : https://hal.archives-ouvertes.fr/hal-01337409
Automated verification of selected equivalences for security protocols, The Journal of Logic and Algebraic Programming, vol.75, issue.1, pp.3-51, 2008. ,
DOI : 10.1016/j.jlap.2007.06.002
Automated reasoning for equivalences in the applied pi calculus with barriers, Proc. 29th Computer Security Foundations Symposium (CSF'16, pp.310-324, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01423742
Automated verification of equivalence properties of cryptographic protocol Blind signatures for untraceable payments, Advances in Cryptology: Proceedings of CRYPTO '82, pp.199-203, 1982. ,
Trace equivalence decision, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011. ,
DOI : 10.1145/2046707.2046744
The Finite Variant Property: How to Get Rid of Some Algebraic Properties, Term Rewriting and Applications, 16th International Conference , RTA. LNCS, pp.294-307, 2005. ,
DOI : 10.1007/978-3-540-32033-3_22
A survey of algebraic properties used in cryptographic protocols, Journal of Computer Security, vol.14, issue.1, pp.1-43, 2006. ,
DOI : 10.3233/JCS-2006-14101
URL : https://hal.archives-ouvertes.fr/inria-00000552
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, 20th International Conference on Computer Aided Verification (CAV'08). LNCS, pp.414-418, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
Formal Analysis of E-Cash Protocols, Proceedings of the 12th International Conference on Security and Cryptography, pp.65-75, 2015. ,
DOI : 10.5220/0005544500650075
URL : https://hal.archives-ouvertes.fr/hal-01337410
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Foundations of Security Analysis and Design V, pp.1-50, 2009. ,
DOI : 10.1007/s10990-007-9000-6
URL : http://users.dsic.upv.es/%7Esescobar/papers/fosad07.pdf
Folding variant narrowing and optimal variant termination, Journal of Logic and Algebraic Programming, vol.81, pp.7-8, 2012. ,
DOI : 10.1007/978-3-642-16310-4_5
URL : http://www.dsic.upv.es/%7Esescobar/papers/wrla10.pdf
A practical secret voting scheme for large scale elections, International Workshop on the Theory and Application of Cryptographic Techniques, 1992. ,
DOI : 10.1007/3-540-57220-1_66
CPSA: a cryptographic protocol shapes analyzer, 2009. ,
Coercion-resistant electronic elections, ACM workshop on Privacy in the electronic society (WPES'05), pp.61-70, 2005. ,
DOI : 10.1145/1102199.1102213
URL : http://eprint.iacr.org/2002/165.pdf
Automated analysis of security protocols with global state, Journal of Computer Security, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-00955869
The TAMARIN Prover for the Symbolic Analysis of Security Protocols, CAV. LNCS, pp.696-701, 2013. ,
DOI : 10.1007/978-3-642-39799-8_48
An electronic voting scheme, IFIP World Conference on IT Tools, pp.21-30, 1996. ,
DOI : 10.1007/978-0-387-34979-4_3
A Hybrid Analysis for Security Protocols with State, Proc. 11th International Conference on Integrated Formal Methods (IFM'14), pp.272-287, 2014. ,
DOI : 10.1007/978-3-319-10181-1_17
A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA, Security and Trust Management (STM) 2014, pp.162-177, 2014. ,
DOI : 10.1007/978-3-319-11851-2_11
Formal Analysis of Key Exchange Protocols and Physical Protocols, ETH Zurich, 2012. ,
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012. ,
DOI : 10.1109/CSF.2012.25
URL : http://doi.org/10.1109/csf.2012.25