M. Abadi and C. Fournet, Mobile values, new names, and secure communication, 28th Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001.
DOI : 10.1145/373243.360213

URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Abadi and C. Fournet, Private authentication, Theoretical Computer Science, vol.322, issue.3, pp.427-476, 2004.
DOI : 10.1016/j.tcs.2003.12.023

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.1266

M. Abadi and A. D. Gordon, A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.1-70, 1999.
DOI : 10.1145/266420.266432

M. Arapinis, T. Chothia, E. Ritter, and M. D. Ryan, Analysing Unlinkability and Anonymity Using the Applied Pi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, pp.107-121, 2010.
DOI : 10.1109/CSF.2010.15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.5739

M. Arapinis, L. I. Mancini, E. Ritter, M. Ryan, N. Golde et al., New privacy issues in mobile telephony, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.205-216, 2012.
DOI : 10.1145/2382196.2382221

A. Armando, The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, 17th International Conference on Computer Aided Verification (CAV'05), pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

D. Baelde, S. Delaune, I. Gazeau, and S. Kremer, Symbolic verification of privacy-type properties for security protocols with XOR, 30th Computer Security Foundations Symposium (CSF'17, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01533694

D. Baelde, S. Delaune, and L. Hirschi, Partial order reduction for security protocols, 26th International Conference on Concurrency Theory (CONCUR'15) Leibniz-Zentrum für Informatik, pp.497-510, 2015.

D. A. Basin, J. Dreier, and R. Sasse, Automated Symbolic Proofs of Observational Equivalence, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1144-1155, 2015.
DOI : 10.1007/978-3-540-79966-5_1

URL : https://hal.archives-ouvertes.fr/hal-01337409

M. Baudet, Deciding security of protocols against off-line guessing attacks, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.16-25, 2005.
DOI : 10.1145/1102120.1102125

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.4077

B. Blanchet, Automatic proof of strong secrecy for security protocols, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.86-100, 2004.
DOI : 10.1109/SECPRI.2004.1301317

B. Blanchet, M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008.
DOI : 10.1109/LICS.2005.8

B. Blanchet, B. Smyth, and V. Cheval, Automatic Cryptographic Protocol Verifier, 2016.

R. Chadha, V. Cheval, S. ¸. Ciobâc?, and S. Kremer, Automated verification of equivalence properties of cryptographic protocol, ACM Transactions on Computational Logic, vol.23, issue.4, p.2016

V. Cheval, H. Comon-lundh, and S. Delaune, Automating Security Analysis: Symbolic Equivalence of Constraint Systems, International Joint Conference on Automated Reasoning (IJCAR'10), volume 6173 of LNAI, pp.412-426, 2010.
DOI : 10.1007/978-3-642-14203-1_35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.3094

V. Cheval, H. Comon-lundh, and S. Delaune, Trace equivalence decision, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.321-330, 2011.
DOI : 10.1145/2046707.2046744

URL : http://kar.kent.ac.uk/46878/1/CCD-ccs11.pdf

V. Cheval, V. Cortier, and S. Delaune, Deciding equivalence-based properties using constraint solving, Theoretical Computer Science, vol.492, pp.1-39
DOI : 10.1016/j.tcs.2013.04.016

URL : https://hal.archives-ouvertes.fr/hal-00881060

Y. Chevalier and M. Rusinowitch, Decidability of Equivalence of Symbolic Derivations, Journal of Automated Reasoning, vol.17, issue.3, 2010.
DOI : 10.1145/219282.219298

URL : https://hal.archives-ouvertes.fr/inria-00527630

T. Chothia and V. Smirnov, A Traceability Attack against e-Passports, 14th International Conference on Financial Cryptography and Data Security (FC'10), pp.20-34, 2010.
DOI : 10.1007/978-3-642-14577-3_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.1985

C. J. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, 20th International Conference on Computer Aided Verification (CAV'08), pp.414-418, 2008.
DOI : 10.1007/978-3-540-70545-1_38

S. Delaune, S. Kremer, and M. D. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

T. Dierks and E. Rescorla, The transport layer security (TLS) protocol version 1.1. RFC 4346, 2008.
DOI : 10.17487/rfc4346

S. Escobar, C. Meadows, and J. Meseguer, Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Foundations of Security Analysis and Design V, pp.1-50, 2009.
DOI : 10.1007/s10990-007-9000-6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.3197

C. Kaufman, P. Hoffman, Y. Nir, and P. Eronen, Internet key exchange protocol version 2 (ikev2), RFC, vol.7296, 2014.
DOI : 10.17487/rfc7296

C. Neuman, S. Hartman, and K. Raeburn, The kerberos network authentication service (v5), RFC, vol.4120, 2005.
DOI : 10.17487/rfc4120

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.178.8719

P. Y. Ryan and S. A. Schneider, An attack on a recursive authentication protocol A cautionary tale, Information Processing Letters, vol.65, issue.1, pp.7-10, 1998.
DOI : 10.1016/S0020-0190(97)00180-4

S. Santiago, S. Escobar, C. Meadows, and J. Meseguer, A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA, 10th International Workshop on Security and Trust Management (STM'14), pp.162-177, 2014.
DOI : 10.1007/978-3-319-11851-2_11

B. Schmidt, S. Meier, C. Cremers, and D. Basin, The TAMARIN prover for the symbolic analysis of security protocols, 25th International Conference on Computer Aided Verification (CAV'13), pp.696-701, 2013.

A. Tiu and J. Dawson, Automating Open Bisimulation Checking for the Spi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, pp.307-321, 2010.
DOI : 10.1109/CSF.2010.28

T. Van-deursen and S. Radomirovic, Attacks on RFID protocols, IACR Cryptology ePrint Archive, p.310, 2008.

F. Yang, S. Escobar, C. A. Meadows, J. Meseguer, and S. Santiago, Strand spaces with choice via a process algebra semantics, Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, PPDP '16, pp.76-89, 2016.
DOI : 10.1145/1389449.1389452