The AVISS Security Protocol Analysis Tool, Computer-Aided Verification CAV'02, pp.349-354, 2002. ,
DOI : 10.1007/3-540-45657-0_27
URL : https://hal.archives-ouvertes.fr/inria-00100915
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis, Proceedings of the 12th International Symposium of Formal Methods Europe (FME), LNCS 2805, pp.875-893 ,
DOI : 10.1007/978-3-540-45236-2_47
3: The Intermediate Format. www.avispa-project.org, 2003. ,
An On-the-Fly Model-Checker for Security Protocol Analysis, Proceedings of ESORICS'03, pp.253-270 ,
DOI : 10.1007/978-3-540-39650-5_15
A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990. ,
DOI : 10.1145/77648.77649
A Survey of Authentication Protocol Literature: Version 1, 1997. ,
Events in security protocols, Proceedings of the 8th ACM conference on Computer and Communications Security, pp.96-105, 2001. ,
The attacker in ubiquitous computing environments: Formalising the threat model, Proc. of the 1st Intl Workshop on Formal Aspects in Security and Trust, pp.83-97, 2003. ,
CAPSL integrated protocol environment, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.207-221, 2000. ,
DOI : 10.1109/DISCEX.2000.824980
Optimizing protocol rewrite rules of CIL specifications, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, pp.52-63, 2000. ,
DOI : 10.1109/CSFW.2000.856925
On the Security of Public-Key Protocols, IEEE Transactions on Information Theory, vol.2, issue.29, 1983. ,
Analyzing a Library of Security Protocols using Casper and FDR, Proceedings of the Workshop on Formal Methods and Security Protocols, 1999. ,
The model checker SPIN, IEEE Transactions on Software Engineering, vol.23, issue.5, pp.279-295, 1997. ,
DOI : 10.1109/32.588521
RFC 1510: The Kerberos Network Authentication Service (V5), Sept, 1993. ,
The temporal logic of actions, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.872-923, 1994. ,
DOI : 10.1145/177492.177726
Verification of Security Protocols using LOTOS ? Method and Application. Computer Communications, special issue on " Formal Description Techniques in Practice, pp.1089-1103, 2000. ,
Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, Proceedings of TACAS'96, pp.147-166, 1996. ,
DOI : 10.1007/3-540-61042-1_43
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-43, 1997. ,
DOI : 10.1109/CSFW.1997.596782
Casper: A compiler for the analysis of security protocols, Journal of Computer Security, vol.6, issue.1-2, pp.53-84, 1998. ,
DOI : 10.3233/JCS-1998-61-204
The NRL Protocol Analyzer: An Overview, The Journal of Logic Programming, vol.26, issue.2, pp.113-131, 1996. ,
DOI : 10.1016/0743-1066(95)00095-X
Using encryption for authentication in large networks of computers, Communications of the ACM, vol.21, issue.12, 1978. ,
DOI : 10.1145/359657.359659
The inductive approach to verifying cryptographic protocols, Journal of Computer Security, vol.6, issue.1-2, pp.85-128, 1998. ,
DOI : 10.3233/JCS-1998-61-205
Athena: A new efficient automatic checker for security protocol analysis, Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW '99), pp.192-202, 1999. ,