A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, 17th International Conference on Computer Aided Verification, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

G. Bella and L. C. Paulson, Mechanical Proofs about a Non-repudiation Protocol, 14th Int. Conference Theorem Proving in Higher Order Logics, TPHOLs, pp.91-104, 2001.
DOI : 10.1007/3-540-44755-5_8

Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes-drielsma, J. Mantovani et al., A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols, Automated Software Engineering, Proc. of the Workshop on Specification and Automated Processing of Security Requirements, SAPS, pp.193-205, 2004.
URL : https://hal.archives-ouvertes.fr/inria-00099882

S. Gürgens, C. Rudolph, and H. Vogt, On the Security of Fair Non-repudiation Protocols, 6th Int. Conference on Information Security, ISC, volume 2851 of Lecture Notes in Computer Science, pp.193-207, 2003.

S. Kremer, O. Markowitch, and J. Zhou, An intensive survey of fair non-repudiation protocols, Computer Communications, vol.25, issue.17, pp.1606-1621, 2002.
DOI : 10.1016/S0140-3664(02)00049-X

S. Kremer and J. Raskin, A Game-Based Verification of Non-repudiation and Fair Exchange Protocols, 12th Int, pp.551-565, 2001.
DOI : 10.1007/3-540-44685-0_37

A. Mccullagh and W. Caelli, Non-repudiation in the digital environment, Reviewed Jounal on the Internet, 2000.
DOI : 10.5210/fm.v5i8.778

P. Ryan, M. Goldsmith, G. Lowe, B. Roscoe, and S. Schneider, Modelling & Analysis of Security Protocols, 2000.

S. Schneider, Formal analysis of a non-repudiation protocol, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), pp.54-65, 1998.
DOI : 10.1109/CSFW.1998.683155

V. Shmatikov and J. C. Mitchell, Analysis of Abuse-Free Contract Signing, 4th Int. Conference on Financial Cryptography, pp.174-191, 2001.
DOI : 10.1007/3-540-45472-1_13

J. Zhou and D. Gollmann, A Fair Non-repudiation Protocol, Proc. of the IEEE Symposium on Research in Security and Privacy, pp.55-61, 1996.

J. Zhou and D. Gollmann, Observations on non-repudiation, Advances in Cryptology ? Int. Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT, pp.133-144, 1996.
DOI : 10.1007/BFb0034842

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.5940

J. Zhou and D. Gollmann, Towards Verification of Non-repudiation Protocols, Proc. of Int. Refinement Workshop and Formal Methods Pacific, pp.370-380, 1998.