D. Basin, Lazy infinite-state analysis of security protocols, Secure Networking -CQRE [Secure] 1999. CQRE. LNCS, vol.1740, pp.30-42, 1999.

D. Basin, C. Cremers, J. Dreier, and R. Sasse, Symbolically analyzing security protocols using tamarin, SIGLOG News, vol.4, issue.4, pp.19-30, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01622110

D. Basin, C. Cremers, and C. Meadows, Model checking security protocols, Handbook of Model Checking, pp.727-762, 2018.

D. Basin, S. Mödersheim, and L. Viganò, OFMC: a symbolic model checker for security protocols, Int. J. Inf. Secur, vol.4, issue.3, pp.181-208, 2004.

D. A. Basin, C. Cremers, and S. Meier, Provably repairing the ISO/IEC 9798 standard for entity authentication, J. Comput. Secur, vol.21, issue.6, pp.817-846, 2013.

D. A. Basin, C. J. Cremers, K. Miyazaki, S. Radomirovic, and D. Watanabe, Improving the security of cryptographic protocol standards, IEEE Secur. Priv, vol.13, issue.3, pp.24-31, 2015.

D. A. Basin, J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse et al., Formal analysis of 5G authentication, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01898050

B. Schmidt, S. Meier, C. Cremers, and D. Basin, Automated analysis of Diffie-Hellman protocols and advanced security properties, Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF), pp.78-94, 2012.

C. Sprenger and D. Basin, Refining key establishment, Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF), pp.230-246, 2012.

C. Sprenger and D. Basin, Refining security protocols, J. Comput. Secur, vol.26, issue.1, pp.71-120, 2018.