M. Abadi, B. Blanchet, and C. Fournet, The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01423924

C. Baier and J. Katoen, Principles of model checking, 2008.

D. Basin and C. Cremers, Modeling and analyzing security in the presence of compromising adversaries, European Symposium on Research in Computer Security, 2010.

D. Basin, C. Cremers, and C. Meadows, Model checking security protocols, Handbook of Model Checking, 2015.

D. Basin, S. Mödersheim, and L. Viganò, An On-the-Fly Model-Checker for Security Protocol Analysis, Computer Security -ES-ORICS 2003, 2003.

N. Ben-henda, Generic and efficient attacker models in spin, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, 2014.

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001.

M. Edmund and . Clarke, Orna Grumberg, and Doron Peled. Model checking, 1999.

C. Cremers, Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2, European Symposium on Research in Computer Security, 2011.

J. F. Cas, S. Cremers, E. Mauw, and . Vink, Injective synchronisation: an extension of the authentication hierarchy, Theoretical Computer Science, 2006.

C. Cremers, Scyther: Semantics and verification of security protocols, 2006.

D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, 1983.

R. Gerth, Concise Promela Reference

. Google,

G. J. Holzmann, The model checker SPIN, IEEE Transactions on Software Engineering, 1997.

C. Kaufman, Internet key exchange protocol version 2 (IKEv2). RFC 7296, 2014.

R. Küsters and T. Truderung, Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation, 22nd IEEE Computer Security Foundations Symposium, 2009.

, Linear Temporal Logic, 2017.

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997.

G. Lowe, Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, Tools and Algorithms for the Construction and Analysis of Systems, 1996.

C. Meadows, Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer, Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999.

C. Meadows, The NRL Protocol Analyzer: An Overview, The Journal of Logic Programming, 1996.

S. Meier, The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Computer Aided Verification, 2013.

. Avispa-project, Deliverable D6.2: Specification of the Problems in the High-Level Specification Language, 2003.

S. Kent and K. Seo, Security Architecture for the Internet Protocol. RFC 4301, 2005.