The applied pi calculus: Mobile values, new names, and secure communication, J. ACM, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Principles of model checking, 2008. ,
Modeling and analyzing security in the presence of compromising adversaries, European Symposium on Research in Computer Security, 2010. ,
Model checking security protocols, Handbook of Model Checking, 2015. ,
An on-the-fly model-checker for security protocol analysis, Computer Security -ESORICS 2003, 2003. ,
Generic and efficient attacker models in spin, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, 2014. ,
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001. ,
Model checking, 1999. ,
Key exchange in ipsec revisited: Formal analysis of ikev1 and ikev2, European Symposium on Research in Computer Security, 2011. ,
Injective synchronisation: an extension of the authentication hierarchy, Theoretical Computer Science, 2006. ,
Scyther: Semantics and verification of security protocols, Eindhoven University of Technology Eindhoven, 2006. ,
On the security of public key protocols, IEEE Transactions on Information Theory, 1983. ,
Concise promela reference, 1997. ,
,
The model checker spin, IEEE Transactions on Software Engineering, 1997. ,
Internet key exchange protocol version 2 (IKEv2), RFC, vol.7296, 2014. ,
Using proverif to analyze protocols with diffie-hellman exponentiation, 22nd IEEE Computer Security Foundations Symposium, 2009. ,
Breaking and fixing the needham-schroeder public-key protocol using fdr, Tools and Algorithms for the Construction and Analysis of Systems, 1996. ,
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997. ,
Analysis of the internet key exchange protocol using the nrl protocol analyzer, Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999. ,
The nrl protocol analyzer: An overview, The Journal of Logic Programming, 1996. ,
The tamarin prover for the symbolic analysis of security protocols, Computer Aided Verification, 2013. ,
Deliverable d6.2: Specification of the problems in the high-level specification language, 2003. ,
Security Architecture for the Internet Protocol, RFC, vol.4301, 2005. ,