The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, CAV 2005, pp.281-285, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00000408
1: The High Level Protocol Specification Language ,
3: The Intermediate Format ,
OFMC: A symbolic model checker for security protocols, International Journal of Information Security, vol.7, issue.3, 2004. ,
DOI : 10.1109/CSFW.2001.930145
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.9886
The CL-Atse Protocol Analyser, RTA 2006, pp.277-286, 2006. ,
DOI : 10.1007/11805618_21
URL : https://hal.archives-ouvertes.fr/inria-00103573
SATMC: A SAT-Based Model Checker for Security Protocols, JELIA 2004, pp.730-733, 2004. ,
DOI : 10.1007/978-3-540-30227-8_68
Improvements on the Genet and Klay Technique to Automatically Verify Security Protocols, Proc. of Automated Verification of Infinite States Systems, pp.1-11, 2004. ,
On the Security of Public-Key Protocols, IEEE Transactions on Information Theory, vol.2, issue.29, 1983. ,
Protocol insecurity with finite number of sessions is NP-complete, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.174-187, 2001. ,
DOI : 10.1109/CSFW.2001.930145
URL : https://hal.archives-ouvertes.fr/inria-00072492
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.22644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.9720
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-43, 1997. ,
DOI : 10.1109/CSFW.1997.596782
The temporal logic of actions, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.872-923, 1994. ,
DOI : 10.1145/177492.177726
HLPSL Models of CWA 14890-1 Protocols ,
DOI : 10.1007/978-3-642-27257-8_20