Mobile values, new names, and secure communication, Proceedings of the 28th Symposium on Principles of Programming Languages (POPL'01, 2001. ,
DOI : 10.1145/373243.360213
URL : https://hal.archives-ouvertes.fr/hal-01423924
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proc. 17th International Conference on Computer Aided Verification (CAV'05), pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication, Journal of Computer Security, vol.21, issue.6, pp.817-846, 2013. ,
DOI : 10.1007/978-3-642-28641-4_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.377.9839
Modeling Human Errors in Security Protocols, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.325-340, 2016. ,
DOI : 10.1109/CSF.2016.30
An automatic security protocol verifier based on resolution theorem proving (invited tutorial), Proceedings of the 20th International Conference on Automated Deduction (CADE-20), 2005. ,
Automatic Cryptographic Protocol Verifier, 2016. ,
Automated verification of equivalence properties of cryptographic protocol, ACM Transactions on Computational Logic, 2016. ,
Automatically Checking Commitment Protocols in ProVerif without False Attacks, Proceedings of the 4th International Conference on Principles of Security and Trust (POST'15), pp.137-155, 2015. ,
DOI : 10.1007/978-3-662-46666-7_8
The Finite Variant Property: How to Get Rid of Some Algebraic Properties, Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), pp.294-307, 2005. ,
DOI : 10.1007/978-3-540-32033-3_22
Analysing Password Protocol Security Against Off-line Dictionary Attacks, Electronic Notes in Theoretical Computer Science, vol.121, pp.47-63, 2005. ,
DOI : 10.1016/j.entcs.2004.10.007
URL : http://doi.org/10.1016/j.entcs.2004.10.007
Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks, Journal of Automated Reasoning, vol.40, issue.2, pp.85-124, 2006. ,
DOI : 10.1007/s10817-005-9017-7
URL : https://hal.archives-ouvertes.fr/inria-00578855
Formal verification of protocols based on short authenticated strings (extended version) Research report, Inria Nancy -Grand Est (Villers-l` es, 2017. ,
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-207, 1983. ,
DOI : 10.1109/TIT.1983.1056650
Ceremony design and analysis. Cryptology ePrint Archive, Report, vol.399399, 2007. ,
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Foundations of Security Analysis and Design V, pp.1-50, 2009. ,
DOI : 10.1007/s10990-007-9000-6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.3197
Folding variant narrowing and optimal variant termination, The Journal of Logic and Algebraic Programming, vol.81, issue.7-8, pp.898-928, 2012. ,
DOI : 10.1016/j.jlap.2012.01.002
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.3740
Du-Vote: Remote Electronic Voting with Untrusted Computers, 2015 IEEE 28th Computer Security Foundations Symposium, pp.155-169, 2015. ,
DOI : 10.1109/CSF.2015.18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.696.4425
Analysing protocols subject to guessing attacks, Journal of Computer Security, vol.12, issue.1, pp.83-98, 2004. ,
DOI : 10.3233/JCS-2004-12104
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.8012
Deriving Ephemeral Authentication Using Channel Axioms, Proc. 17th International Workshop on Security Protocols, pp.240-261, 2009. ,
DOI : 10.1007/978-3-642-36213-2_27
Model checking cryptographic protocols subject to combinatorial attack, 2012. ,
Pretty good democracy, Proc. 17th International Workshop on Security Protocols. Revised Selected Papers, pp.111-130, 2009. ,
DOI : 10.1007/978-3-642-36213-2_15
The tamarin prover for the symbolic analysis of security protocols, Proc. 25th International Conference on Computer Aided Verification (CAV'13), pp.696-701, 2013. ,