A. Armando, D. Basin, M. Bouallagui, Y. Chevalier, L. Compagna et al., The AVISS Security Protocol Analysis Tool, Computer-Aided Verification CAV'02, pp.349-354, 2002.
DOI : 10.1007/3-540-45657-0_27

URL : https://hal.archives-ouvertes.fr/inria-00100915

A. Armando, L. Compagna, and P. Ganty, SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis, Proceedings of the 12th International Symposium of Formal Methods Europe (FME), LNCS 2805, pp.875-893
DOI : 10.1007/978-3-540-45236-2_47

A. Deliverable, 3: The Intermediate Format. www.avispa-project.org, 2003.

D. Basin, S. Mödersheim, and L. Viganò, An On-the-Fly Model-Checker for Security Protocol Analysis, Proceedings of ESORICS'03, pp.253-270
DOI : 10.1007/978-3-540-39650-5_15

M. Burrows, M. Abadi, and R. Needham, A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990.
DOI : 10.1145/77648.77649

J. Clark and J. Jacob, A Survey of Authentication Protocol Literature: Version 1, 1997.

F. Crazzolara and G. Winskel, Events in security protocols, Proceedings of the 8th ACM conference on Computer and Communications Security, pp.96-105, 2001.

S. Creese, M. Goldsmith, B. Roscoe, and I. Zakiuddin, The attacker in ubiquitous computing environments: Formalising the threat model, Proc. of the 1st Intl Workshop on Formal Aspects in Security and Trust, pp.83-97, 2003.

G. Denker and J. Millen, CAPSL integrated protocol environment, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.207-221, 2000.
DOI : 10.1109/DISCEX.2000.824980

G. Denker, J. Millen, A. Grau, and J. Filipe, Optimizing protocol rewrite rules of CIL specifications, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, pp.52-63, 2000.
DOI : 10.1109/CSFW.2000.856925

D. Dolev and A. Yao, On the Security of Public-Key Protocols, IEEE Transactions on Information Theory, vol.2, issue.29, 1983.

B. Donovan, P. Norris, and G. Lowe, Analyzing a Library of Security Protocols using Casper and FDR, Proceedings of the Workshop on Formal Methods and Security Protocols, 1999.

G. J. Holzmann, The model checker SPIN, IEEE Transactions on Software Engineering, vol.23, issue.5, pp.279-295, 1997.
DOI : 10.1109/32.588521

J. Kohl and C. Neuman, RFC 1510: The Kerberos Network Authentication Service (V5), Sept, 1993.

L. Lamport, The temporal logic of actions, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.872-923, 1994.
DOI : 10.1145/177492.177726

G. Leduc and F. Germeau, Verification of Security Protocols using LOTOS ? Method and Application. Computer Communications, special issue on " Formal Description Techniques in Practice, pp.1089-1103, 2000.

G. Lowe, Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, Proceedings of TACAS'96, pp.147-166, 1996.
DOI : 10.1007/3-540-61042-1_43

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-43, 1997.
DOI : 10.1109/CSFW.1997.596782

G. Lowe, Casper: A compiler for the analysis of security protocols, Journal of Computer Security, vol.6, issue.1-2, pp.53-84, 1998.
DOI : 10.3233/JCS-1998-61-204

C. Meadows, The NRL Protocol Analyzer: An Overview, The Journal of Logic Programming, vol.26, issue.2, pp.113-131, 1996.
DOI : 10.1016/0743-1066(95)00095-X

R. M. Needham and M. D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM, vol.21, issue.12, 1978.
DOI : 10.1145/359657.359659

L. C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security, vol.6, issue.1-2, pp.85-128, 1998.
DOI : 10.3233/JCS-1998-61-205

D. Song, Athena: A new efficient automatic checker for security protocol analysis, Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW '99), pp.192-202, 1999.