A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification, 17th International Conference, pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

A. Armando, R. Carbone, and L. Compagna, LTL Model Checking for Security Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.385-396, 2007.
DOI : 10.1109/csf.2007.24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.546.2317

G. Bella and L. C. Paulson, Mechanical Proofs about a Non-repudiation Protocol, Theorem Proving in Higher Order Logics, 14th International Conference, pp.91-104, 2001.
DOI : 10.1007/3-540-44755-5_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.6788

J. Cederquist, R. Corin, and M. T. Dashti, On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol, Information and Communications Security, 7th International Conference, pp.27-39, 2005.
DOI : 10.1007/11602897_3

S. Gürgens and C. Rudolph, Security analysis of efficient (Un-) fair non-repudiation protocols, Formal Aspects of Computing, vol.17, issue.3, pp.260-276, 2005.
DOI : 10.1007/s00165-004-0055-4

S. Gürgens, C. Rudolph, and H. Vogt, On the Security of Fair Non-repudiation Protocols, Information Security, 6th International Conference, pp.193-207, 2003.
DOI : 10.1007/10958513_15

S. Kremer and O. Markowitch, Optimistic Non-repudiable Information Exchange, 21st Symp. on Information Theory in the Benelux, pp.139-146, 2000.

S. Kremer, O. Markowitch, and J. Zhou, An intensive survey of fair non-repudiation protocols, Computer Communications, vol.25, issue.17, pp.1606-1621, 2002.
DOI : 10.1016/S0140-3664(02)00049-X

S. Kremer and J. Raskin, A Game-Based Verification of Non-repudiation and Fair Exchange Protocols, CONCUR 2001 -Concurrency Theory, 12th International Conference, pp.551-565, 2001.
DOI : 10.1007/3-540-44685-0_37

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-44, 1997.
DOI : 10.1109/CSFW.1997.596782

O. Markowitch and S. Kremer, An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party, Information Security, 4th International Conference, pp.363-378, 2001.
DOI : 10.1007/3-540-45439-X_25

O. Markowitch and Y. Roggeman, Probabilistic Non-Repudiation without Trusted Third Party, Second Workshop on Security in Communication Networks'99, 1999.
DOI : 10.1007/3-540-45439-x_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.8176

P. Ochsenschläger, J. Repp, R. Rieke, and U. Nitsche, The SH-Verification Tool -- Abstraction-Based Verification of Co-operating Systems, Formal Aspects of Computing, vol.10, issue.4, pp.381-404, 1998.
DOI : 10.1007/s001650050023

H. Pagnia and F. C. Gärtner, On the Impossibility of Fair Exchange without a Trusted Third Party, 1999.

A. W. Roscoe, C. A. Hoare, and R. Bird, The Theory and Practice of Concurrency, 1997.

P. Ryan, M. Goldsmith, G. Lowe, B. Roscoe, and S. Schneider, Modelling and Analysis of Security Protocols, 2000.

J. Santiago and L. Vigneron, Optimistic Non-repudiation Protocol Analysis, Proceedings of the Workshop in Information Security Theory and Practices (WISTP'2007), Smart Cards, Mobile and Ubiquitous Computing Systems, pp.90-101, 2007.
DOI : 10.1109/SECPRI.1996.502669

URL : https://hal.archives-ouvertes.fr/inria-00176333

S. Schneider, Formal analysis of a non-repudiation protocol, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), pp.54-65, 1998.
DOI : 10.1109/CSFW.1998.683155

V. Shmatikov and J. C. Mitchell, Analysis of Abuse-Free Contract Signing, Financial Cryptography, 4th International Conference, pp.174-191, 2000.
DOI : 10.1007/3-540-45472-1_13

K. Wei and J. Heather, Towards Verification of Timed Non-repudiation Protocols, Formal Aspects in Security and Trust, 3rd international Workshop, FAST 2005, pp.244-257, 2006.
DOI : 10.1007/11679219_18

K. Wei and J. Heather, A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols, Formal Aspects in Security and Trust, pp.202-219, 2006.
DOI : 10.1007/978-3-540-75227-1_14

J. Zhou, R. H. Deng, and F. Bao, Evolution of Fair Non-repudiation with TTP, ACISP '99: Proceedings of the 4th Australasian Conference on Information Security and Privacy, pp.258-269, 1999.
DOI : 10.1007/3-540-48970-3_21

J. Zhou and D. Gollmann, A Fair Non-repudiation Protocol, IEEE Symposium on Security and Privacy, pp.55-61, 1996.

J. Zhou and D. Gollmann, Towards verification of non-repudiation protocols, Proceedings of 1998 International Refinement Workshop and Formal Methods Pacific, pp.370-380, 1998.

L. Unité-de-recherche-inria-lorraine, Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Futurs : Parc Club Orsay Université -ZAC des Vignes 4

I. Unité-de-recherche and . Rennes, IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier (France) Unité de recherche INRIA Rocquencourt : Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex (France) Unité de recherche, 2004.