Corrigendum: The power of temporal proofs, Theor. Comput. Sci, vol.70, issue.2, 1990. ,
Analyzing Security Protocols with Secrecy Types and Logic Programs, Journal of the ACM, vol.52, issue.1, 2005. ,
DOI : 10.1145/1044731.1044735
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.3131
A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.36-47, 1997. ,
DOI : 10.1145/266420.266432
On the symbolic reduction of processes with cryptographic functions, Theor. Comput. Sci, vol.290, issue.1, 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00072478
Security protocols: from linear to classical logic by abstract interpretation, Information Processing Letters, vol.95, issue.5, 2005. ,
DOI : 10.1016/j.ipl.2005.05.011
A method for symbolic analysis of security protocols, Theoretical Computer Science, vol.338, issue.1-3, pp.1-3, 2005. ,
DOI : 10.1016/j.tcs.2005.03.044
The Classical Decision Problem, 2001. ,
DOI : 10.1007/978-3-642-59207-2
On a Decision Method in Restricted Second Order Arithmetic, Proc. of Int. Conf. on Logic, Methodology, and Philosophy of Science, 1962. ,
DOI : 10.1007/978-1-4613-8928-6_23
Complementation in abstract interpretation, ACM Trans. Program. Lang. Syst, vol.19, issue.1, 1997. ,
Petri nets in cryptographic protocols, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001, p.3, 2001. ,
DOI : 10.1109/IPDPS.2001.925135
Proving concurrent constraint programs correct, ACM Transactions on Programming Languages and Systems, vol.19, issue.5, 1997. ,
Equality and monodic first-order temporal logic, Studia Logica, vol.72, issue.2, 2002. ,
Timestamps in key distribution protocols, Communications of the ACM, vol.24, issue.8, p.24, 1981. ,
DOI : 10.1145/358722.358740
Computing symbolic models for verifying cryptographic protocols, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930144
Hiding Names: Private Authentication in the Applied Pi Calculus, Proc. of ISSS, 2003. ,
DOI : 10.1007/3-540-36532-X_20
Decidable fragment of firstorder temporal logics, Ann. Pure Appl. Logic, vol.106, pp.1-3, 2000. ,
The Temporal Logic of Reactive and Concurrent Systems: Specification, 1991. ,
DOI : 10.1007/978-1-4612-0931-7
Decidability and incompleteness results for first-order temporal logics of linear time, Journal of Applied Non-Classical Logics, vol.56, issue.1, 1992. ,
DOI : 10.1016/0304-3975(86)90157-X
Communicating and Mobile Systems: the Pi-Calculus, 1999. ,
Computation: finite and infinite machines, 1967. ,
On the expressive power of temporal concurrent constraint programming languages, Proceedings of the 4th ACM SIGPLAN international conference on Principles and practice of declarative programming , PPDP '02, 2002. ,
DOI : 10.1145/571157.571173
Temporal concurrent constraint programming: Denotation, logic and applications, Nordic Journal of Computing, vol.9, issue.1, 2002. ,
DOI : 10.7146/brics.v8i48.21708
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.3124
Universal concurrent constraint programing, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, 2008. ,
DOI : 10.1145/1363686.1363726
URL : https://hal.archives-ouvertes.fr/inria-00201497
Foundations of timed concurrent constraint programming, Proceedings Ninth Annual IEEE Symposium on Logic in Computer Science, 1994. ,
DOI : 10.1109/LICS.1994.316085
Concurrent constraint programming, Proceedings of the 17th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '90, 1993. ,
DOI : 10.1145/96709.96733
The semantic foundations of concurrent constraint programming, Proceedings of the 18th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '91, 1991. ,
DOI : 10.1145/99583.99627
Incompleteness of first-order temporal logic with until, Theoretical Computer Science, vol.57, issue.2-3, 1988. ,
DOI : 10.1016/0304-3975(88)90045-X
Decidability of infinite-state timed CCP processes and first-order LTL, Theoretical Computer Science, vol.330, issue.3, 2005. ,
DOI : 10.1016/j.tcs.2004.10.009