A calculus for cryptographic protocols: The spi calculus. Information and Computation, pp.1481-70, 1999. ,
Reconciling two views of cryptography (the computational soundness of formal encryption), Proc. 1st IFIP International conference on Theorectical Computer Science (IFIP-TCS), pp.3-22, 2000. ,
Deciding Knowledge in Security Protocols under (Many More) Equational Theories, 18th IEEE Computer Security Foundations Workshop (CSFW'05), pp.62-76, 2005. ,
DOI : 10.1109/CSFW.2005.14
URL : https://hal.archives-ouvertes.fr/inria-00000554
Deciding knowledge in security protocols under equational theories, Theoretical Computer Science, vol.367, issue.1-2, pp.2-32, 2006. ,
DOI : 10.1016/j.tcs.2006.08.032
URL : https://hal.archives-ouvertes.fr/inria-00000554
On the reachability problem in cryptographic protocols, Lecture Notes in Computer Science, vol.1877, pp.380-394, 2000. ,
On the symbolic reduction of processes with cryptographic functions, Theoretical Computer Science, vol.290, issue.1, pp.695-740, 2003. ,
DOI : 10.1016/S0304-3975(02)00090-7
URL : https://hal.archives-ouvertes.fr/inria-00072478
Deciding security of protocols against off-line guessing attacks, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.16-25, 2005. ,
DOI : 10.1145/1102120.1102125
Normal Proofs in Intruder Theories, Lecture Notes in Computer Science, vol.40, issue.2, pp.151-166, 2006. ,
DOI : 10.1007/978-3-540-24725-8_25
A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990. ,
DOI : 10.1145/77648.77649
Key Substitution in the Symbolic Analysis of Cryptographic Protocols, Lecture Notes in Computer Science, vol.4855, pp.121-132, 2007. ,
DOI : 10.1007/978-3-540-77050-3_10
URL : https://hal.archives-ouvertes.fr/hal-00183337
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents, FSTTCS, pp.124-135, 2003. ,
DOI : 10.1007/978-3-540-24597-1_11
URL : https://hal.archives-ouvertes.fr/inria-00103935
An NP decision procedure for protocol insecurity with XOR, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., pp.247-274, 2005. ,
DOI : 10.1109/LICS.2003.1210066
URL : https://hal.archives-ouvertes.fr/inria-00103954
Towards an Automatic Analysis of Web Service Security, Lecture Notes in Computer Science, vol.4720, pp.133-147, 2007. ,
DOI : 10.1007/978-3-540-74621-8_9
URL : https://hal.archives-ouvertes.fr/inria-00557707
Combining Intruder Theories, Lecture Notes in Computer Science, vol.3580, pp.639-651, 2005. ,
DOI : 10.1007/11523468_52
URL : https://hal.archives-ouvertes.fr/inria-00070512
A survey of authentication protocol literature ,
Intruder Theories (Ongoing Work), Lecture Notes in Computer Science, vol.2987, pp.1-4, 2004. ,
DOI : 10.1007/978-3-540-24727-2_1
The Finite Variant Property: How to Get Rid of Some Algebraic Properties, Lecture Notes in Computer Science, vol.3467, pp.294-307, 2005. ,
DOI : 10.1007/978-3-540-32033-3_22
A survey of algebraic properties used in cryptographic protocols, Journal of Computer Security, vol.14, issue.1, 2004. ,
DOI : 10.3233/JCS-2006-14101
URL : https://hal.archives-ouvertes.fr/inria-00000552
Rewrite Systems, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B), pp.243-320, 1990. ,
DOI : 10.1016/B978-0-444-88074-1.50011-1
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-207, 1983. ,
DOI : 10.1109/TIT.1983.1056650
Canonical forms and unification, Lecture Notes in Computer Science, vol.87, pp.318-334, 1980. ,
DOI : 10.1007/3-540-10009-1_25
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, LNCS, vol.3444, pp.186-200, 2005. ,
DOI : 10.1007/978-3-540-31987-0_14
An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters, vol.56, issue.3, 1995. ,
DOI : 10.1016/0020-0190(95)00144-2
A compiler for the analysis of security protocols, CSFW, pp.18-30, 1997. ,
Towards a completeness result for model checking of security protocols, Journal of Computer Security, vol.7, issue.1, 1999. ,
An Efficient Unification Algorithm, ACM Transactions on Programming Languages and Systems, vol.4, issue.2, pp.258-282, 1982. ,
DOI : 10.1145/357162.357169
The NRL Protocol Analyzer: An Overview, The Journal of Logic Programming, vol.26, issue.2, pp.113-131, 1996. ,
DOI : 10.1016/0743-1066(95)00095-X
Constraint solving for bounded-process cryptographic protocol analysis, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.166-175, 2001. ,
DOI : 10.1145/501983.502007
Automated analysis of cryptographic protocols using Mur??, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.141-153, 1997. ,
DOI : 10.1109/SECPRI.1997.601329
Abstract, The Journal of Symbolic Logic, vol.32, issue.02, pp.636-647, 1997. ,
DOI : 10.1007/BF01084396
Protocol insecurity with a finite number of sessions and composed keys is NP-complete, Theoretical Computer Science, vol.299, issue.1-3, pp.1-3451, 2003. ,
DOI : 10.1016/S0304-3975(02)00490-5