The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification, 17th International Conference, CAV 2005, pp.281-285, 2005. ,
LTL Model Checking for Security Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.385-396, 2007. ,
Mechanical Proofs about a Non-repudiation Protocol, Theorem Proving in Higher Order Logics, 14th International Conference, pp.91-104, 2001. ,
DOI : 10.1007/3-540-44755-5_8
Estimation of TTP Features in Non-repudiation Service, International Conference on Computational Science and Its Applications -ICCSA, pp.549-558, 2007. ,
DOI : 10.1007/978-3-540-74477-1_51
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol, Information and Communications Security, 7th International Conference, pp.27-39, 2005. ,
DOI : 10.1007/11602897_3
A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols, Proceedings of Workshop on Specification and Automated Processing of Security Requirements (SAPS), 2004. ,
URL : https://hal.archives-ouvertes.fr/inria-00099882
SAT-based Model-Checking of Security Protocols, 2005. ,
Security analysis of efficient (Un-) fair non-repudiation protocols, Formal Aspects of Computing, vol.17, issue.3, pp.260-276, 2005. ,
DOI : 10.1007/s00165-004-0055-4
On the security of fair non-repudiation protocols, International Journal of Information Security, vol.11, issue.4, pp.253-262, 2005. ,
DOI : 10.1007/s10207-004-0063-7
Authentication tests and disjoint encryption: A design method for security protocols*, Journal of Computer Security, vol.12, issue.3-4, pp.409-433, 2004. ,
DOI : 10.3233/JCS-2004-123-405
Compiling and Verifying Security Protocols, Logic for Programming and Automated Reasoning, pp.131-160, 2000. ,
DOI : 10.1007/3-540-44404-1_10
URL : https://hal.archives-ouvertes.fr/inria-00099161
Optimistic Non-repudiable Information Exchange, 21st Symp. on Information Theory in the Benelux, pp.139-146, 2000. ,
An intensive survey of fair non-repudiation protocols, Computer Communications, vol.25, issue.17, pp.1606-1621, 2002. ,
DOI : 10.1016/S0140-3664(02)00049-X
A Game-Based Verification of Non-repudiation and Fair Exchange Protocols, CONCUR 2001 -Concurrency Theory, 12th International Conference, pp.551-565, 2001. ,
DOI : 10.1007/3-540-44685-0_37
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-44, 1997. ,
DOI : 10.1109/CSFW.1997.596782
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party, Information Security, 4th International Conference, pp.363-378, 2001. ,
DOI : 10.1007/3-540-45439-X_25
Probabilistic Non-Repudiation without Trusted Third Party, Second Workshop on Security in Communication Networks'99, 1999. ,
DOI : 10.1007/3-540-45439-x_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.8176
The SH-Verification Tool -- Abstraction-Based Verification of Co-operating Systems, Formal Aspects of Computing, vol.10, issue.4, pp.381-404, 1998. ,
DOI : 10.1007/s001650050023
On the Impossibility of Fair Exchange without a Trusted Third Party, 1999. ,
On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol, Formal Aspects in Security and Trust, FAST'05, pp.5-15, 2006. ,
DOI : 10.1007/11679219_2
The Theory and Practice of Concurrency, 1997. ,
Modelling and Analysis of Security Protocols, 2000. ,
Optimistic Non-repudiation Protocol Analysis, Proceedings of the Workshop in Information Security Theory and Practices (WISTP'2007), Smart Cards, Mobile and Ubiquitous Computing Systems, pp.90-101, 2007. ,
DOI : 10.1109/SECPRI.1996.502669
URL : https://hal.archives-ouvertes.fr/inria-00176333
Formal analysis of a non-repudiation protocol, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), pp.54-65, 1998. ,
DOI : 10.1109/CSFW.1998.683155
Analysis of Abuse-Free Contract Signing, Financial Cryptography, 4th International Conference, pp.174-191, 2000. ,
DOI : 10.1007/3-540-45472-1_13
Towards Verification of Timed Non-repudiation Protocols, Formal Aspects in Security and Trust, 3rd international Workshop, FAST 2005, pp.244-257, 2006. ,
DOI : 10.1007/11679219_18
A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols, Formal Aspects in Security and Trust, pp.202-219, 2006. ,
DOI : 10.1007/978-3-540-75227-1_14
Evolution of Fair Non-repudiation with TTP, ACISP '99: Proceedings of the 4th Australasian Conference on Information Security and Privacy, pp.258-269, 1999. ,
DOI : 10.1007/3-540-48970-3_21
A Fair Non-repudiation Protocol, IEEE Symposium on Security and Privacy, pp.55-61, 1996. ,
Towards verification of non-repudiation protocols, Proceedings of 1998 International Refinement Workshop and Formal Methods Pacific, pp.370-380, 1998. ,