The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Proc. 20th International Conference on Computer Aided Verification (CAV'08), vol.5123, pp.414-418, 2008. ,
The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Proc. 25th International Conference on Computer Aided Verification (CAV'13), vol.8044, pp.696-701, 2013. ,
Constraint solving for bounded-process cryptographic protocol analysis, Proc. 8th Conference on Computer and Communications Security, pp.166-175, 2001. ,
The inductive approach to verifying cryptographic protocols, Journal of Computer Security, vol.6, issue.1/, pp.85-128, 1998. ,
Modelling and Analysis of Security Protocols, 2000. ,
A Calculus for Cryptographic Protocols: The spi Calculus, Inf. Comput, vol.148, issue.1, pp.1-70, 1999. ,
, 28th Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001.
, Journal of Computer Security, vol.7, issue.2/3, pp.191-230, 1999.
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus, Proc. 23rd Computer Security Foundations Symposium (CSF'10), pp.107-121, 2010. ,
Analysis of a receipt-free auction protocol in the applied pi calculus, Proc. International Workshop on Formal Aspects in Security and Trust (FAST'10, 2010. ,
Automated verification of selected equivalences for security protocols, Journal of Logic and Algebraic Programming, vol.75, issue.1, pp.3-51, 2008. ,
Automating Open Bisimulation Checking for the Spi Calculus, Proc. 23rd Computer Security Foundations Symp. (CSF'10), pp.307-321, 2010. ,
Trace Equivalence Decision: Negative Tests and Nondeterminism, Proc. 18th ACM Conference on Computer and Communications Security (CCS'11), 2011. ,
Automated verification of equivalence properties of cryptographic protocol, ACM Transactions on Computational Logic, vol.17, issue.4, pp.1-32, 2016. ,
SAT-Equiv: an efficient tool for equivalence properties, Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pp.481-494, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01624274
DEEPSEC: Deciding Equivalence Properties in Security Protocols -Theory and Practice, Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P'18), pp.525-542, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01698177
Deciding equivalence-based properties using constraint solving, Theoretical, Computer Science, vol.492, pp.1-39, 2013. ,
Partial Order Reduction for Security Protocols, Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15, vol.42, pp.497-510, 2015. ,
On communication models when verifying equivalence properties, 6th International Conference on Principles of Security and Trust (POST'17), vol.10204, pp.141-163, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01450898
Automatic Verification of Correspondences for Security Protocols, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009. ,
, , 2019.
, Private Authentication, Theor. Comput. Sci, vol.322, issue.3, pp.427-476, 2004.