O. Héam, J. Kouchnarenko, S. Mantovani, D. Mödersheim, M. Von-oheimb et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification, 17th International Conference, CAV 2005, pp.281-285, 2005.

A. Armando, R. Carbone, and L. Compagna, LTL Model Checking for Security Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.385-396, 2007.

G. Bella and L. C. Paulson, Mechanical Proofs about a Non-repudiation Protocol, Theorem Proving in Higher Order Logics, 14th International Conference, pp.91-104, 2001.
DOI : 10.1007/3-540-44755-5_8

M. Carbonell, J. M. Sierra, J. A. Onieva, J. Lopez, and J. Zhou, Estimation of TTP Features in Non-repudiation Service, International Conference on Computational Science and Its Applications -ICCSA, pp.549-558, 2007.
DOI : 10.1007/978-3-540-74477-1_51

J. Cederquist, R. Corin, and M. T. Dashti, On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol, Information and Communications Security, 7th International Conference, pp.27-39, 2005.
DOI : 10.1007/11602897_3

Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes-drielsma, J. Mantovani et al., A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols, Proceedings of Workshop on Specification and Automated Processing of Security Requirements (SAPS), 2004.
URL : https://hal.archives-ouvertes.fr/inria-00099882

L. Compagna, SAT-based Model-Checking of Security Protocols, 2005.

S. Gürgens and C. Rudolph, Security analysis of efficient (Un-) fair non-repudiation protocols, Formal Aspects of Computing, vol.17, issue.3, pp.260-276, 2005.
DOI : 10.1007/s00165-004-0055-4

S. Gürgens, C. Rudolph, and H. Vogt, On the security of fair non-repudiation protocols, International Journal of Information Security, vol.11, issue.4, pp.253-262, 2005.
DOI : 10.1007/s10207-004-0063-7

J. D. Guttman, Authentication tests and disjoint encryption: A design method for security protocols*, Journal of Computer Security, vol.12, issue.3-4, pp.409-433, 2004.
DOI : 10.3233/JCS-2004-123-405

F. Jacquemard, M. Rusinowitch, and L. Vigneron, Compiling and Verifying Security Protocols, Logic for Programming and Automated Reasoning, pp.131-160, 2000.
DOI : 10.1007/3-540-44404-1_10

URL : https://hal.archives-ouvertes.fr/inria-00099161

S. Kremer and O. Markowitch, Optimistic Non-repudiable Information Exchange, 21st Symp. on Information Theory in the Benelux, pp.139-146, 2000.

S. Kremer, O. Markowitch, and J. Zhou, An intensive survey of fair non-repudiation protocols, Computer Communications, vol.25, issue.17, pp.1606-1621, 2002.
DOI : 10.1016/S0140-3664(02)00049-X

S. Kremer and J. Raskin, A Game-Based Verification of Non-repudiation and Fair Exchange Protocols, CONCUR 2001 -Concurrency Theory, 12th International Conference, pp.551-565, 2001.
DOI : 10.1007/3-540-44685-0_37

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-44, 1997.
DOI : 10.1109/CSFW.1997.596782

O. Markowitch and S. Kremer, An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party, Information Security, 4th International Conference, pp.363-378, 2001.
DOI : 10.1007/3-540-45439-X_25

O. Markowitch and Y. Roggeman, Probabilistic Non-Repudiation without Trusted Third Party, Second Workshop on Security in Communication Networks'99, 1999.
DOI : 10.1007/3-540-45439-x_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.8176

P. Ochsenschläger, J. Repp, R. Rieke, and U. Nitsche, The SH-Verification Tool -- Abstraction-Based Verification of Co-operating Systems, Formal Aspects of Computing, vol.10, issue.4, pp.381-404, 1998.
DOI : 10.1007/s001650050023

H. Pagnia and F. C. Gärtner, On the Impossibility of Fair Exchange without a Trusted Third Party, 1999.

S. Pancho-festin and D. Gollmann, On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol, Formal Aspects in Security and Trust, FAST'05, pp.5-15, 2006.
DOI : 10.1007/11679219_2

A. W. Roscoe, C. A. Hoare, and R. Bird, The Theory and Practice of Concurrency, 1997.

P. Ryan, M. Goldsmith, G. Lowe, B. Roscoe, and S. Schneider, Modelling and Analysis of Security Protocols, 2000.

J. Santiago and L. Vigneron, Optimistic Non-repudiation Protocol Analysis, Proceedings of the Workshop in Information Security Theory and Practices (WISTP'2007), Smart Cards, Mobile and Ubiquitous Computing Systems, pp.90-101, 2007.
DOI : 10.1109/SECPRI.1996.502669

URL : https://hal.archives-ouvertes.fr/inria-00176333

S. Schneider, Formal analysis of a non-repudiation protocol, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), pp.54-65, 1998.
DOI : 10.1109/CSFW.1998.683155

V. Shmatikov and J. C. Mitchell, Analysis of Abuse-Free Contract Signing, Financial Cryptography, 4th International Conference, pp.174-191, 2000.
DOI : 10.1007/3-540-45472-1_13

K. Wei and J. Heather, Towards Verification of Timed Non-repudiation Protocols, Formal Aspects in Security and Trust, 3rd international Workshop, FAST 2005, pp.244-257, 2006.
DOI : 10.1007/11679219_18

K. Wei and J. Heather, A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols, Formal Aspects in Security and Trust, pp.202-219, 2006.
DOI : 10.1007/978-3-540-75227-1_14

J. Zhou, R. H. Deng, and F. Bao, Evolution of Fair Non-repudiation with TTP, ACISP '99: Proceedings of the 4th Australasian Conference on Information Security and Privacy, pp.258-269, 1999.
DOI : 10.1007/3-540-48970-3_21

J. Zhou and D. Gollmann, A Fair Non-repudiation Protocol, IEEE Symposium on Security and Privacy, pp.55-61, 1996.

J. Zhou and D. Gollmann, Towards verification of non-repudiation protocols, Proceedings of 1998 International Refinement Workshop and Formal Methods Pacific, pp.370-380, 1998.