A. Armando, The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proc. of 17th Int. Conf. on Computer Aided Verification (CAV'05), pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

A. Armando and L. Compagna, SAT-based model-checking for security protocols analysis, International Journal of Information Security, vol.9, issue.1, pp.3-32, 2008.
DOI : 10.1007/s10207-007-0041-y

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.5936

G. Bella, F. Massacci, and L. C. Paulson, Verifying the SET registration protocols, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.77-87, 2003.
DOI : 10.1109/JSAC.2002.806133

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.756

G. Bella and L. C. Paulson, Using Isabelle to prove properties of the kerberos authentication system, Proc. of the DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997.

M. Burrows, M. Abadi, and R. M. Needham, A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990.
DOI : 10.1145/77648.77649

E. Cohen, TAPS: A first-order verifier for cryptographic protocols, CSFW '00: Proceedings of the 13th IEEE Computer Security Foundations Workshop (CSFW'00), p.144, 2000.
DOI : 10.1109/csfw.2000.856933

R. Corin, S. Etalle, P. H. Hartel, and A. Mader, Timed model checking of security protocols, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.23-32, 2004.
DOI : 10.1145/1029133.1029137

G. Delzanno and P. Ganty, Automatic Verification of Time Sensitive Cryptographic Protocols, Proc. of the 10th Int. Conf. on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'04), pp.342-356, 2004.
DOI : 10.1007/978-3-540-24730-2_27

D. Dolev and A. Yao, On the security of public key protocols, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pp.198-207, 1983.
DOI : 10.1109/SFCS.1981.32

E. Fray, I. Kurkowski, M. Peja´speja´s, J. Ma´ckówma´cków, and W. , A New Mathematical Model for the Analytical Risk Assessment and Prediction in IT Systems, Control&Cybernetics, vol.41, pp.241-268, 2012.

N. Evans and S. Schneider, Analysing Time Dependent Security Properties in CSP Using PVS, Proc. of the 6th European Symposium on Research in Computer Security (ES- ORICS'00), pp.222-237, 2000.
DOI : 10.1007/10722599_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.1873

G. Jakubowska, W. Penczek, and M. Srebrny, Verifying security protocols with timestamps via translation to timed automata, Proc. of the International Workshop on Concurrency , Specification and Programming (CS&P'05), pp.100-115, 2005.

M. Kacprzak, Verics 2007 -a model checker for knowledge and real-time, Fundam. Inform, vol.85, issue.1-4, pp.313-328, 2008.

M. Kurkowski and W. Ma´ckówma´cków, Using Backward Strategy to the Needham, Artificial Intelligence and Security in Computing Systems, pp.249-260, 2003.
DOI : 10.1007/978-1-4419-9226-0_24

M. Kurkowski and J. Peja´speja´s, A Propositional Logic for Access Control Policy in Distributed Systems, Artificial Intelligence and Security in Computing Systems, pp.157-191, 2003.
DOI : 10.1007/978-1-4419-9226-0_18

M. Kurkowski and W. Penczek, Verifying Security Protocols Modeled by Networks of Automata, Fund. Inform, vol.79, pp.453-471, 2007.

M. Kurkowski and W. Penczek, Verifying Timed Security Protocols via Translation to Timed Automata, Fund, Inform, vol.93, issue.1-3, pp.245-259, 2009.

M. Kurkowski and W. Penczek, Applying Timed Automata to Model Checking of Security Protocols Handbook of Finite State Based Models and Applications, pp.223-254, 2012.

M. Kurkowski and M. Srebrny, A Quantifier-free First-order Knowledge Logic of Authentication, Fund. Inform, vol.72, pp.263-282, 2006.

G. Lowe, Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, TACAS, pp.147-166, 1996.
DOI : 10.1007/3-540-61042-1_43

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.27.6385

G. Lowe, Some new attacks upon security protocols, Proceedings 9th IEEE Computer Security Foundations Workshop, 1996.
DOI : 10.1109/CSFW.1996.503701

C. Meadows, The NRL Protocol Analyzer: An Overview, The Journal of Logic Programming, vol.26, issue.2, pp.13-131, 1996.
DOI : 10.1016/0743-1066(95)00095-X

URL : http://doi.org/10.1016/0743-1066(95)00095-x

J. H. Moore, Protocol failures in cryptosystems, Proceedings of the IEEE, 1988.
DOI : 10.1109/5.4444

R. M. Needham and M. D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM, vol.21, issue.12, pp.993-999, 1978.
DOI : 10.1145/359657.359659

L. C. Paulson, Inductive analysis of the Internet protocol TLS, ACM Transactions on Information and System Security, vol.2, issue.3, pp.332-351, 1999.
DOI : 10.1145/322510.322530

O. Siedlecka-lamch, M. Kurkowski, and H. Piech, A New Effective Approach for Modeling and Verification of Security Protocols, Proceedings of 21th international Workshop on Concurrency , Specification and Programming, pp.191-202, 2012.