, The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01423924
Principles of model checking, 2008. ,
Modeling and analyzing security in the presence of compromising adversaries, European Symposium on Research in Computer Security, 2010. ,
Model checking security protocols, Handbook of Model Checking, 2015. ,
An On-the-Fly Model-Checker for Security Protocol Analysis, Computer Security -ES-ORICS 2003, 2003. ,
Generic and efficient attacker models in spin, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, 2014. ,
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001. ,
Orna Grumberg, and Doron Peled. Model checking, 1999. ,
Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2, European Symposium on Research in Computer Security, 2011. ,
Injective synchronisation: an extension of the authentication hierarchy, Theoretical Computer Science, 2006. ,
Scyther: Semantics and verification of security protocols, 2006. ,
On the security of public key protocols, IEEE Transactions on Information Theory, 1983. ,
Concise Promela Reference ,
,
The model checker SPIN, IEEE Transactions on Software Engineering, 1997. ,
Internet key exchange protocol version 2 (IKEv2). RFC 7296, 2014. ,
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation, 22nd IEEE Computer Security Foundations Symposium, 2009. ,
, Linear Temporal Logic, 2017.
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997. ,
Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, Tools and Algorithms for the Construction and Analysis of Systems, 1996. ,
Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer, Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999. ,
The NRL Protocol Analyzer: An Overview, The Journal of Logic Programming, 1996. ,
The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Computer Aided Verification, 2013. ,
Deliverable D6.2: Specification of the Problems in the High-Level Specification Language, 2003. ,
Security Architecture for the Internet Protocol. RFC 4301, 2005. ,