https://sites.google.com/site/globalstatesverif, 2018. ,
Mobile values, new names, and secure communication, Proc. of the 28th ACM Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001. ,
DOI : 10.1145/360204.360213
URL : https://hal.archives-ouvertes.fr/hal-01423924
StatVerif: Verification of stateful processes, Journal of Computer Security, vol.22, issue.5, pp.743-821, 2014. ,
DOI : 10.3233/JCS-140501
URL : http://www.cs.bham.ac.uk/%7Emdr/research/papers/pdf/11-state-appi.pdf
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, 17th International Conference on Computer Aided Verification, pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Discovering Concrete Attacks on Website Authorization by Formal Analysis, 2012 IEEE 25th Computer Security Foundations Symposium, 2012. ,
DOI : 10.1109/CSF.2012.27
URL : https://hal.archives-ouvertes.fr/hal-01102202
Cryptographically verified implementations for TLS, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.459-468, 2008. ,
DOI : 10.1145/1455770.1455828
An automatic security protocol verifier based on resolution theorem proving (invited tutorial), 20th International Conference on Automated Deduction (CADE-20), 2005. ,
Modeling and verifying security protocols with the applied pi calculus and ProVerif. Foundations and Trends in Privacy and Security, pp.1-135, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01423760
Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols, 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp.68-82, 2017. ,
DOI : 10.1109/CSF.2017.7
URL : https://hal.archives-ouvertes.fr/hal-01575861
Proverif 1.97: Automatic cryptographic protocol verifier, p.2017 ,
Set-Pi: Set Membership p-Calculus, 2015 IEEE 28th Computer Security Foundations Symposium, 2015. ,
DOI : 10.1109/CSF.2015.20
URL : http://orbit.dtu.dk/files/120567254/extended.pdf
Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices, 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp.467-480, 2017. ,
DOI : 10.1109/EuroSP.2017.19
URL : https://hal.archives-ouvertes.fr/hal-01408584
A formal analysis of the neuchâtel e-voting protocol, 3rd IEEE European Symposium on Security and Privacy (EuroSP'18), 2018. ,
A formal analysis of the Norwegian E-voting protocol, Journal of Computer Security, vol.5, issue.1, pp.21-57, 2017. ,
DOI : 10.1109/CSF.2010.28
URL : https://hal.archives-ouvertes.fr/hal-00732907
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Computer Aided Verification, 20th International Conference, pp.414-418, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
Formal Analysis of Protocols Based on TPM State Registers, 2011 IEEE 24th Computer Security Foundations Symposium, pp.66-82, 2011. ,
DOI : 10.1109/CSF.2011.12
URL : https://hal.archives-ouvertes.fr/inria-00636747
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties, Theoretical Computer Science, vol.367, issue.1-2, pp.162-202, 2006. ,
DOI : 10.1016/j.tcs.2006.08.035
2015 Neuch??tel???s Cast-as-Intended Verification Mechanism, 5th International Conference, pp.3-18, 2015. ,
DOI : 10.1007/978-3-319-22270-7_1
Abuse-Free Optimistic Contract Signing, 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'99), pp.449-466, 1999. ,
DOI : 10.1007/3-540-48405-1_29
URL : http://www.mathmagic.cn/crypt1998-2003/papers/1666/16660449.pdf
Abuse-Free Optimistic Contract Signing, pp.449-466, 1999. ,
DOI : 10.1007/3-540-48405-1_29
URL : http://www.mathmagic.cn/crypt1998-2003/papers/1666/16660449.pdf
CANAuth-A simple, backward compatible broadcast authentication protocol for CAN bus, Proceedings of ECRYPT, 2011. ,
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach, 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp.435-450, 2017. ,
DOI : 10.1109/EuroSP.2017.38
URL : https://hal.archives-ouvertes.fr/hal-01575923
Automated analysis of security protocols with global state, Journal of Computer Security, vol.11, issue.1, pp.583-616, 2016. ,
DOI : 10.1109/SP.2014.19
URL : https://hal.archives-ouvertes.fr/hal-01351388
Advancing automated security protocol verification, 2013. ,
The TAMARIN Prover for the Symbolic Analysis of Security Protocols, International Conference on Computer Aided Verification (CAV'13), pp.696-701, 2013. ,
DOI : 10.1007/978-3-642-39799-8_48
AIF- $$\omega $$ ?? : Set-Based Protocol Abstraction with Countable Families, 5th Conference on Principles of Security and Trust (POST'16), 2016. ,
DOI : 10.1007/978-3-642-02959-2_10
Two easy theories whose combination is hard, 1977. ,
Cryptographic Token Interface Standard , v2, 2004. ,
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012. ,
DOI : 10.1109/CSF.2012.25
Incremental Satisfiability and Implication for UTVPI Constraints, INFORMS Journal on Computing, vol.22, issue.4, pp.514-527, 2010. ,
DOI : 10.1287/ijoc.1090.0369
URL : http://arxiv.org/pdf/0709.2961
The YubiKey Manual -Usage, configuration and introduction of basic concepts (Version 2, p.2010 ,