A. Armando and L. Compagna, Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning, Foundation of Computer Security & Verification Workshops, 2002.
DOI : 10.1007/3-540-36135-9_14

N. Asokan and P. Ginzboorg, Key agreement in ad hoc networks, Computer Communications, vol.23, issue.17, pp.1627-1637, 2000.
DOI : 10.1016/S0140-3664(00)00249-8

D. Basin, S. Mödersheim, and L. Viganò, An On-the-Fly Model-Checker for Security Protocol Analysis, Proceedings of ESORICS'03, pp.253-270, 2003.
DOI : 10.1007/978-3-540-39650-5_15

J. A. Bull and D. J. Otway, The authentication protocol, Defence Research Agency, 1997.

B. Blanchet and A. Podelski, Verification of Cryptographic Protocols: Tagging Enforces Termination, Lecture Notes in Computer Science, vol.2620, pp.136-152, 2003.
DOI : 10.1007/3-540-36576-1_9

D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1981.
DOI : 10.1109/TIT.1983.1056650

K. O. Kürtz, R. Küsters, and T. Wilke, Selecting theories and nonce generation for recursive protocols, FMSE '07: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, pp.61-70, 2007.

S. Kremer, A. Mercier, and R. Treinen, Proving Group Protocols Secure Against Eavesdroppers, Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), 2008.
DOI : 10.1007/978-3-540-71070-7_9

URL : https://hal.archives-ouvertes.fr/hal-00496351

R. Küsters, T. Truderung, and E. Zurich, On the automatic analysis of recursive security protocols with xor An abridged version appears in STACS, 2007.

R. Küsters and T. Wilke, Automata-Based Analysis of Recursive Cryptographic Protocols, 21st Symposium on Theoretical Aspects of Computer Science Lecture Notes in Computer Science, 2004.
DOI : 10.1007/978-3-540-24749-4_34

C. Meadows, Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives, the First Workshop on Issues in the Theory of Security, pp.87-92, 2000.

S. Mittra, Iolus: A framework for scalable secure multicasting, SIGCOMM, pp.277-288, 1997.

C. Meadows and P. Syverson, Formalizing GDOI group key management requirements in NPATRL, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.235-244, 2001.
DOI : 10.1145/501983.502016

J. Meseguer and P. Thati, Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols, Higher-Order and Symbolic Computation, pp.123-160, 2007.

L. C. Paulson, Isabelle: A generic theorem prover, Lecture Notes in Computer Science, vol.828, pp.283-298, 1996.
DOI : 10.1007/BFb0030541

L. C. Paulson, Mechanized proofs for a recursive authentication protocol, Proceedings 10th Computer Security Foundations Workshop, pp.84-95, 1997.
DOI : 10.1109/CSFW.1997.596790

O. Pereira and J. Quisquater, Some attacks upon authenticated group key agreement protocols, Journal of Computer Security, vol.11, issue.4, pp.555-580, 2003.
DOI : 10.3233/JCS-2003-11404

URL : http://doi.org/10.3233/jcs-2003-11404

O. Pereira, J. Ramanujam, S. P. Suresh, M. Turuani, and A. Bundy, Generic insecurity of cliques-type authenticated group key agreement protocols Tagging makes secrecy decidable with unbounded nonces as well Protocol insecurity with a finite number of sessions, composed keys is np-complete Attacking group multicast key management protocols using CORAL, CSFW FST TCS, Proceedings Proceedings of the ARSPA Workshop, pp.16-19, 2003.

M. Steiner, M. Waidner, G. Tsudik, M. Taghdiri, and D. Jackson, Cliques: A new approach to group key agreement A lightweight formal analysis of a multicast key management scheme, ICDCS '98: Proceedings of the The 18th International Conference on Distributed Computing Systems, pp.240-256, 1998.

T. Truderung, Selecting Theories and Recursive Protocols, Lecture Notes in Computer Science, pp.217-232, 2005.
DOI : 10.1007/11539452_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.488.1561

C. Weidenbach, Towards an automatic analysis of security protocols in firstorder logic, 16th International Conference on Automated Deduction, volume 1632 of lncs, pp.314-328, 1999.