Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning, Foundation of Computer Security & Verification Workshops, 2002. ,
DOI : 10.1007/3-540-36135-9_14
Key agreement in ad hoc networks, Computer Communications, vol.23, issue.17, pp.1627-1637, 2000. ,
DOI : 10.1016/S0140-3664(00)00249-8
An On-the-Fly Model-Checker for Security Protocol Analysis, Proceedings of ESORICS'03, pp.253-270, 2003. ,
DOI : 10.1007/978-3-540-39650-5_15
Verification of cryptographic protocols: Tagging enforces termination, Foundations of Software Science and Computational Structures FOSSACS 2003 Held as Part of the Joint European Conference on Theory and Practice of Software, ETAPS 2003 Proceedings, volume 2620 of Lecture Notes in Computer Science, pp.136-152, 2003. ,
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1981. ,
DOI : 10.1109/TIT.1983.1056650
The authentication protocol, Defence Research Agency, 1997. ,
Proving Group Protocols Secure Against Eavesdroppers, Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), 2008. ,
DOI : 10.1007/978-3-540-71070-7_9
URL : https://hal.archives-ouvertes.fr/hal-00496351
Selecting theories and nonce generation for recursive protocols, FMSE '07: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, pp.61-70, 2007. ,
On the automatic analysis of recursive security protocols with xor An abridged version appears in STACS, 2007. ,
Automata-Based Analysis of Recursive Cryptographic Protocols, 21st Symposium on Theoretical Aspects of Computer Science Lecture Notes in Computer Science, 2004. ,
DOI : 10.1007/978-3-540-24749-4_34
Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives, the First Workshop on Issues in the Theory of Security, pp.87-92, 2000. ,
Iolus: A framework for scalable secure multicasting, SIGCOMM, pp.277-288, 1997. ,
Formalizing GDOI group key management requirements in NPATRL, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.235-244, 2001. ,
DOI : 10.1145/501983.502016
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.914
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols, Higher-Order and Symbolic Computation, pp.123-160, 2007. ,
Isabelle: A generic theorem prover, Lecture Notes in Computer Science, vol.828, pp.283-298, 1996. ,
DOI : 10.1007/BFb0030541
Mechanized proofs for a recursive authentication protocol, Proceedings 10th Computer Security Foundations Workshop, pp.84-95, 1997. ,
DOI : 10.1109/CSFW.1997.596790
Some attacks upon authenticated group key agreement protocols, Journal of Computer Security, vol.11, issue.4, pp.555-580, 2003. ,
DOI : 10.3233/JCS-2003-11404
URL : http://doi.org/10.3233/jcs-2003-11404
Generic insecurity of cliques-type authenticated group key agreement protocols, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., pp.16-19, 2004. ,
DOI : 10.1109/CSFW.2004.1310729
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well, FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference Proceedings, volume 2914 of Lecture Notes in Computer Science, pp.363-374, 2003. ,
DOI : 10.1007/978-3-540-24597-1_31
Protocol insecurity with a finite number of sessions and composed keys is NP-complete, Theoretical Computer Science, vol.299, issue.1-3, pp.1-3451, 2003. ,
DOI : 10.1016/S0304-3975(02)00490-5
Attacking Group Multicast Key Management Protocols Using Coral, Proceedings of the ARSPA Workshop, pp.125-144, 2004. ,
DOI : 10.1016/j.entcs.2004.05.023
CLIQUES: a new approach to group key agreement, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183), 1998. ,
DOI : 10.1109/ICDCS.1998.679745
A Lightweight Formal Analysis of a Multicast Key Management Scheme, pp.240-256, 2003. ,
DOI : 10.1016/0743-1066(95)00095-X
Selecting Theories and Recursive Protocols, pp.217-232, 2005. ,
DOI : 10.1007/11539452_19
The CL-Atse Protocol Analyser, Term Rewriting and Applications -Proc. of RTA, pp.277-286, 2006. ,
DOI : 10.1007/11805618_21
URL : https://hal.archives-ouvertes.fr/inria-00103573
Towards an Automatic Analysis of Security Protocols in First-Order Logic, 16th International Conference on Automated Deduction, pp.314-328, 1999. ,
DOI : 10.1007/3-540-48660-7_29
Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès ,