Mobile values, new names, and secure communication, 28th Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001. ,
DOI : 10.1145/373243.360213
URL : https://hal.archives-ouvertes.fr/hal-01423924
Private authentication, Theoretical Computer Science, vol.322, issue.3, pp.427-476, 2004. ,
DOI : 10.1016/j.tcs.2003.12.023
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.1266
A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.1-70, 1999. ,
DOI : 10.1145/266420.266432
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, pp.107-121, 2010. ,
DOI : 10.1109/CSF.2010.15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.5739
New privacy issues in mobile telephony, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.205-216, 2012. ,
DOI : 10.1145/2382196.2382221
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, 17th International Conference on Computer Aided Verification (CAV'05), pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Symbolic verification of privacy-type properties for security protocols with XOR, 30th Computer Security Foundations Symposium (CSF'17, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01533694
Partial order reduction for security protocols, 26th International Conference on Concurrency Theory (CONCUR'15) Leibniz-Zentrum für Informatik, pp.497-510, 2015. ,
Automated Symbolic Proofs of Observational Equivalence, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1144-1155, 2015. ,
DOI : 10.1007/978-3-540-79966-5_1
URL : https://hal.archives-ouvertes.fr/hal-01337409
Deciding security of protocols against off-line guessing attacks, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.16-25, 2005. ,
DOI : 10.1145/1102120.1102125
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.4077
Automatic proof of strong secrecy for security protocols, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.86-100, 2004. ,
DOI : 10.1109/SECPRI.2004.1301317
Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008. ,
DOI : 10.1109/LICS.2005.8
Automatic Cryptographic Protocol Verifier, 2016. ,
Automated verification of equivalence properties of cryptographic protocol, ACM Transactions on Computational Logic, vol.23, issue.4, p.2016 ,
Automating Security Analysis: Symbolic Equivalence of Constraint Systems, International Joint Conference on Automated Reasoning (IJCAR'10), volume 6173 of LNAI, pp.412-426, 2010. ,
DOI : 10.1007/978-3-642-14203-1_35
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.3094
Trace equivalence decision, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.321-330, 2011. ,
DOI : 10.1145/2046707.2046744
URL : http://kar.kent.ac.uk/46878/1/CCD-ccs11.pdf
Deciding equivalence-based properties using constraint solving, Theoretical Computer Science, vol.492, pp.1-39 ,
DOI : 10.1016/j.tcs.2013.04.016
URL : https://hal.archives-ouvertes.fr/hal-00881060
Decidability of Equivalence of Symbolic Derivations, Journal of Automated Reasoning, vol.17, issue.3, 2010. ,
DOI : 10.1145/219282.219298
URL : https://hal.archives-ouvertes.fr/inria-00527630
A Traceability Attack against e-Passports, 14th International Conference on Financial Cryptography and Data Security (FC'10), pp.20-34, 2010. ,
DOI : 10.1007/978-3-642-14577-3_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.1985
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, 20th International Conference on Computer Aided Verification (CAV'08), pp.414-418, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
The transport layer security (TLS) protocol version 1.1. RFC 4346, 2008. ,
DOI : 10.17487/rfc4346
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Foundations of Security Analysis and Design V, pp.1-50, 2009. ,
DOI : 10.1007/s10990-007-9000-6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.3197
Internet key exchange protocol version 2 (ikev2), RFC, vol.7296, 2014. ,
DOI : 10.17487/rfc7296
The kerberos network authentication service (v5), RFC, vol.4120, 2005. ,
DOI : 10.17487/rfc4120
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.178.8719
An attack on a recursive authentication protocol A cautionary tale, Information Processing Letters, vol.65, issue.1, pp.7-10, 1998. ,
DOI : 10.1016/S0020-0190(97)00180-4
A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA, 10th International Workshop on Security and Trust Management (STM'14), pp.162-177, 2014. ,
DOI : 10.1007/978-3-319-11851-2_11
The TAMARIN prover for the symbolic analysis of security protocols, 25th International Conference on Computer Aided Verification (CAV'13), pp.696-701, 2013. ,
Automating Open Bisimulation Checking for the Spi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, pp.307-321, 2010. ,
DOI : 10.1109/CSF.2010.28
Attacks on RFID protocols, IACR Cryptology ePrint Archive, p.310, 2008. ,
Strand spaces with choice via a process algebra semantics, Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, PPDP '16, pp.76-89, 2016. ,
DOI : 10.1145/1389449.1389452