A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, 17th International Conference on Computer Aided Verification, CAV, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

A. Armando, D. Basin, M. Bouallagui, Y. Chevalier, L. Compagna et al., The AVISS Security Protocol Analysis Tool, 14th International Conference on Computer Aided Verification, CAV, pp.349-353, 2002.
DOI : 10.1007/3-540-45657-0_27

URL : https://hal.archives-ouvertes.fr/inria-00100915

N. Asokan and P. Ginzboorg, Key agreement in ad hoc networks, Computer Communications, vol.23, issue.17, pp.1627-1637, 2000.
DOI : 10.1016/S0140-3664(00)00249-8

G. Ateniese, M. Steiner, and G. Tsudik, New multiparty authentication services and key agreement protocols, IEEE Journal on Selected Areas in Communications, vol.18, issue.4, pp.628-639, 2000.
DOI : 10.1109/49.839937

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.4508

E. Bresson, O. Chevassut, A. Essiari, and D. Pointcheval, Mutual authentication and group key agreement for low-power mobile devices, Special Issue on Security and Performance in Wireless and Mobile Networks, pp.1730-1737, 2004.
DOI : 10.1016/j.comcom.2004.05.023

G. Denker and J. Millen, CAPSL integrated protocol environment, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.207-221, 2000.
DOI : 10.1109/DISCEX.2000.824980

S. Gürgens, P. Ochsenschläger, and C. Rudolph, Authenticity and Provability ??? A Formal Framework, Int. Conference on Infrastructure Security, InfraSec, pp.227-245, 2002.
DOI : 10.1007/3-540-45831-X_16

D. Jackson, Automating first-order relational logic, Proceedings of the 8th ACM SIGSOFT international symposium on Foundations of software engineering, SIGSOFT/FSE, pp.130-139, 2000.

D. Jackson, I. Shlyakhter, and M. Sridharan, A micromodularity mechanism, Proceedings of the 8th European Software Engineering Conference, ESEC, pp.62-73, 2001.

Y. Kim, A. Perrig, and G. Tsudik, Tree-based group key agreement, ACM Transactions on Information and System Security, vol.7, issue.1, pp.60-96, 2004.
DOI : 10.1145/984334.984337

C. Meadows, Extending Formal Cryptographic Protocol Analysis Techniques for Group Protocols and Low-Level Cryptographic Primitives, Proceedings of the 1st Workshop on Issues in the Theory of Security, WITS, pp.87-92, 2000.

C. Meadows and P. Syverson, Formalizing GDOI group key management requirements in NPATRL, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.235-244, 2001.
DOI : 10.1145/501983.502016

S. Mittra, Iolus : A Framework for Scalable Secure Multicasting, Proceedings of ACM SIG- COMM'97, pp.277-288, 1997.

J. Nam, S. Kim, and D. Won, A Weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices, IEEE Communication Letters, vol.9, issue.5, pp.429-431, 2005.

O. Pereira and J. Quisquater, A security analysis of the cliques protocols suites, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.151-166, 2001.
DOI : 10.1109/CSFW.2001.930137

O. Pereira and J. Quisquater, Some attacks upon authenticated group key agreement protocols, Journal of Computer Security, vol.11, issue.4, pp.555-580, 2003.
DOI : 10.3233/JCS-2003-11404

O. Pereira and J. Quisquater, Generic insecurity of cliques-type authenticated group key agreement protocols, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., pp.16-19, 2004.
DOI : 10.1109/CSFW.2004.1310729

G. Steel and A. Bundy, Attacking Group Multicast Key Management Protocols Using Coral, Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis of Electronic Notes in Theoretical Computer Science, pp.125-144, 2004.
DOI : 10.1016/j.entcs.2004.05.023

G. Steel, A. Bundy, and M. Maidl, Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures, Proceedings of 2nd Int. Joint Conference on Automated Reasoning, IJCAR, pp.137-151, 2004.
DOI : 10.1007/978-3-540-25984-8_8

M. Steiner, G. Tsudik, and M. Waidner, CLIQUES: a new approach to group key agreement, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183), pp.380-387, 1998.
DOI : 10.1109/ICDCS.1998.679745

M. Taghdiri and D. Jackson, A Lightweight Formal Analysis of a Multicast Key Management Scheme, Formal Techniques for Networked and Distributed Systems, pp.240-256, 2003.
DOI : 10.1016/0743-1066(95)00095-X

S. Tanaka and F. Sato, A key distribution and rekeying framework with totally ordered multicast protocols, Proceedings 15th International Conference on Information Networking, pp.831-838, 2001.
DOI : 10.1109/ICOIN.2001.905598