M. Abadi and B. Blanchet, Computer-assisted verification of a protocol for certified email, Science of Computer Programming, vol.58, issue.1-2, pp.3-27, 2005.
DOI : 10.1016/j.scico.2005.02.002

M. Abadi, B. Blanchet, and C. Fournet, Just fast keying in the pi calculus, ACM Trans. Inf. Syst. Secur, vol.10, issue.3, 2007.

M. Abadi and C. Fournet, Mobile values, new names, and secure communication, POPL, pp.104-115, 2001.
DOI : 10.1145/373243.360213

URL : https://hal.archives-ouvertes.fr/hal-01423924

A. , G. , O. Technologies, and S. Morpho, Access to e-services with privacypreserving credentials, 2011.

A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification, 17th International Conference, CAV 2005 Proceedings, volume 3576 of Lecture Notes in Computer Science, pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

M. Backes, C. Hritcu, and M. Maffei, Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.23-25, 2008.
DOI : 10.1109/CSF.2008.26

B. Blanchet, From Secrecy to Authenticity in Security Protocols, Static Analysis, 9th International Symposium Proceedings, volume 2477 of Lecture Notes in Computer Science, pp.342-359, 2002.
DOI : 10.1007/3-540-45789-5_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-207, 1983.
DOI : 10.1109/TIT.1983.1056650

H. Krawczyk, SKEME: a versatile secure key exchange mechanism for Internet, Proceedings of Internet Society Symposium on Network and Distributed Systems Security, p.114, 1996.
DOI : 10.1109/NDSS.1996.492418

S. Kremer and M. Ryan, Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, Programming Languages and Systems, 14th European Symposium on Programming,ESOP 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005 Proceedings, pp.186-200, 2005.
DOI : 10.1007/978-3-540-31987-0_14

A. Pfitzmann and M. Köhntopp, Anonymity, Unobservability, and Pseudonymity ??? A Proposal for Terminology, Workshop on Design Issues in Anonymity and Unobservability, pp.1-9, 2001.
DOI : 10.1007/3-540-44702-4_1