Lazy infinite-state analysis of security protocols, Secure Networking -CQRE [Secure] 1999. CQRE. LNCS, vol.1740, pp.30-42, 1999. ,
Symbolically analyzing security protocols using tamarin, SIGLOG News, vol.4, issue.4, pp.19-30, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01622110
Model checking security protocols, Handbook of Model Checking, pp.727-762, 2018. ,
OFMC: a symbolic model checker for security protocols, Int. J. Inf. Secur, vol.4, issue.3, pp.181-208, 2004. ,
Provably repairing the ISO/IEC 9798 standard for entity authentication, J. Comput. Secur, vol.21, issue.6, pp.817-846, 2013. ,
Improving the security of cryptographic protocol standards, IEEE Secur. Priv, vol.13, issue.3, pp.24-31, 2015. ,
Formal analysis of 5G authentication, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01898050
Automated analysis of Diffie-Hellman protocols and advanced security properties, Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF), pp.78-94, 2012. ,
Refining key establishment, Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF), pp.230-246, 2012. ,
Refining security protocols, J. Comput. Secur, vol.26, issue.1, pp.71-120, 2018. ,