The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proc. of 17th Int. Conf. on Computer Aided Verification (CAV'05), pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
SAT-based model-checking for security protocols analysis, International Journal of Information Security, vol.9, issue.1, pp.3-32, 2008. ,
DOI : 10.1007/s10207-007-0041-y
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.5936
Verifying the SET registration protocols, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.77-87, 2003. ,
DOI : 10.1109/JSAC.2002.806133
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.756
Using Isabelle to prove properties of the kerberos authentication system, Proc. of the DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997. ,
A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990. ,
DOI : 10.1145/77648.77649
TAPS: A first-order verifier for cryptographic protocols, CSFW '00: Proceedings of the 13th IEEE Computer Security Foundations Workshop (CSFW'00), p.144, 2000. ,
DOI : 10.1109/csfw.2000.856933
Timed model checking of security protocols, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.23-32, 2004. ,
DOI : 10.1145/1029133.1029137
Automatic Verification of Time Sensitive Cryptographic Protocols, Proc. of the 10th Int. Conf. on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'04), pp.342-356, 2004. ,
DOI : 10.1007/978-3-540-24730-2_27
On the security of public key protocols, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pp.198-207, 1983. ,
DOI : 10.1109/SFCS.1981.32
A New Mathematical Model for the Analytical Risk Assessment and Prediction in IT Systems, Control&Cybernetics, vol.41, pp.241-268, 2012. ,
Analysing Time Dependent Security Properties in CSP Using PVS, Proc. of the 6th European Symposium on Research in Computer Security (ES- ORICS'00), pp.222-237, 2000. ,
DOI : 10.1007/10722599_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.1873
Verifying security protocols with timestamps via translation to timed automata, Proc. of the International Workshop on Concurrency , Specification and Programming (CS&P'05), pp.100-115, 2005. ,
Verics 2007 -a model checker for knowledge and real-time, Fundam. Inform, vol.85, issue.1-4, pp.313-328, 2008. ,
Using Backward Strategy to the Needham, Artificial Intelligence and Security in Computing Systems, pp.249-260, 2003. ,
DOI : 10.1007/978-1-4419-9226-0_24
A Propositional Logic for Access Control Policy in Distributed Systems, Artificial Intelligence and Security in Computing Systems, pp.157-191, 2003. ,
DOI : 10.1007/978-1-4419-9226-0_18
Verifying Security Protocols Modeled by Networks of Automata, Fund. Inform, vol.79, pp.453-471, 2007. ,
Verifying Timed Security Protocols via Translation to Timed Automata, Fund, Inform, vol.93, issue.1-3, pp.245-259, 2009. ,
Applying Timed Automata to Model Checking of Security Protocols Handbook of Finite State Based Models and Applications, pp.223-254, 2012. ,
A Quantifier-free First-order Knowledge Logic of Authentication, Fund. Inform, vol.72, pp.263-282, 2006. ,
Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, TACAS, pp.147-166, 1996. ,
DOI : 10.1007/3-540-61042-1_43
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.27.6385
Some new attacks upon security protocols, Proceedings 9th IEEE Computer Security Foundations Workshop, 1996. ,
DOI : 10.1109/CSFW.1996.503701
The NRL Protocol Analyzer: An Overview, The Journal of Logic Programming, vol.26, issue.2, pp.13-131, 1996. ,
DOI : 10.1016/0743-1066(95)00095-X
URL : http://doi.org/10.1016/0743-1066(95)00095-x
Protocol failures in cryptosystems, Proceedings of the IEEE, 1988. ,
DOI : 10.1109/5.4444
Using encryption for authentication in large networks of computers, Communications of the ACM, vol.21, issue.12, pp.993-999, 1978. ,
DOI : 10.1145/359657.359659
Inductive analysis of the Internet protocol TLS, ACM Transactions on Information and System Security, vol.2, issue.3, pp.332-351, 1999. ,
DOI : 10.1145/322510.322530
A New Effective Approach for Modeling and Verification of Security Protocols, Proceedings of 21th international Workshop on Concurrency , Specification and Programming, pp.191-202, 2012. ,