Symbolic Verification of Lossy Channel Systems: Application to the Bounded Retransmission Protocol, Tools and Algorithms for the Construction and Analysis of Systems , TACAS'99, pp.208-222, 1999. ,
DOI : 10.1007/3-540-49059-0_15
Computer-assisted verification of a protocol for certified email, Science of Computer Programming, vol.58, issue.1-2, pp.3-27, 2005. ,
DOI : 10.1016/j.scico.2005.02.002
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification, CAV'05, pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
On-the-fly analysis of systems with unbounded, lossy FIFO channels, Computer Aided Verification , CAV'98, pp.305-322, 1998. ,
DOI : 10.1007/BFb0028754
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols, Electronic Notes in Theoretical Computer Science, vol.125, issue.1, pp.91-108, 2005. ,
DOI : 10.1016/j.entcs.2004.05.021
Security Analysis of a Probabilistic Non-repudiation Protocol, Process Algebra and Probabilistic Methods : Performance Modeling and Verification, pp.17-36, 2002. ,
DOI : 10.1007/3-540-45605-8_3
Tree regular model checking: A simulation-based approach, Journal of Logic and Algebraic Programming, vol.69, issue.12, pp.93-121, 2006. ,
Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008. ,
DOI : 10.1109/LICS.2005.8
A symbolic decision procedure for cryptographic protocols with time stamps, The Journal of Logic and Algebraic Programming, vol.65, issue.1, pp.1-35, 2005. ,
DOI : 10.1016/j.jlap.2004.09.007
A Generic Approach to the Static Analysis of Concurrent Programs with Procedures, International Journal of Foundations of Computer Science, vol.14, issue.04, pp.551-582, 2003. ,
DOI : 10.1142/S0129054103001893
URL : https://hal.archives-ouvertes.fr/hal-00161114
Reachability Analysis of Synchronized PA Systems, Electronic Notes in Theoretical Computer Science, vol.138, issue.3, pp.153-178, 2005. ,
DOI : 10.1016/j.entcs.2005.02.063
URL : https://hal.archives-ouvertes.fr/hal-00161111
FASTer Acceleration of Counter Automata in Practice, Lecture Notes in Computer Science, vol.2988, pp.576-590, 2004. ,
DOI : 10.1007/978-3-540-24730-2_42
Symbolic verification of communication protocols with infinite state spaces using QDDs, Computer Aided Verification , CAV'96, pp.1-12, 1996. ,
DOI : 10.1007/3-540-61474-5_53
Feasible Trace Reconstruction for Rewriting Approximations, Rewriting Techniques and Applications, RTA'06, pp.123-135 ,
DOI : 10.1007/11805618_10
URL : https://hal.archives-ouvertes.fr/hal-00463426
Rewriting Approximations for Fast Prototyping of Static Analyzers, Rewriting Techniques and Applications, RTA'07 Proceedings, pp.48-62, 2007. ,
DOI : 10.1007/978-3-540-73449-9_6
URL : https://hal.archives-ouvertes.fr/hal-00463418
Automatic Verification of Security Protocols Using Approximations, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00070291
Handling Algebraic Properties in Automatic Analysis of Security Protocols, International Colloquium on Theorical Aspects of Computing, ICTAC'06, pp.153-167, 2006. ,
DOI : 10.1007/11921240_11
URL : https://hal.archives-ouvertes.fr/hal-00463424
Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives, Verification of Infinite-State Systems, INFINITY'07 The final version will be published in EN in Theoretical Computer Science, pp.44-53, 2007. ,
DOI : 10.1016/j.entcs.2009.05.030
URL : https://hal.archives-ouvertes.fr/hal-00561374
Abstract Regular Tree Model Checking, Electronic Notes in Theoretical Computer Science, vol.149, issue.1, pp.37-48, 2006. ,
DOI : 10.1016/j.entcs.2005.11.015
URL : https://hal.archives-ouvertes.fr/hal-00156828
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001. ,
DOI : 10.1109/CSFW.2001.930138
HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols, Computer Aided Verification , CAV'03, pp.219-222, 2003. ,
DOI : 10.1007/978-3-540-45069-6_23
Permutation rewriting and algorithmic verification, Information and Computation, vol.205, issue.2, pp.199-224, 2007. ,
DOI : 10.1016/j.ic.2005.11.007
URL : https://hal.archives-ouvertes.fr/hal-00161120
An On-the-Fly Model-Checker for Security Protocol Analysis, European Symposium on Research in Computer Security, ESORICS'03, pp.253-270, 2003. ,
DOI : 10.1007/978-3-540-39650-5_15
Extrapolating Tree Transformations, Computer Aided Verification, CAV'02 Copenhagen (Denmark), pp.539-554, 2002. ,
DOI : 10.1007/3-540-45657-0_46
URL : https://hal.archives-ouvertes.fr/hal-00161115
Verifying systems with infinite but regular state spaces, Computer Aided Verification, CAV'98, pp.88-97, 1998. ,
Tree Automata Techniques and Applications, 2002. ,
Bottom-up tree pushdown automata and rewrite systems, Rewriting Techniques and Applications, RTA'91, pp.287-298, 1991. ,
DOI : 10.1007/3-540-53904-2_104
A survey of algebraic properties used in cryptographic protocols, Journal of Computer Security, vol.14, issue.1, pp.1-43, 2006. ,
DOI : 10.3233/JCS-2006-14101
URL : https://hal.archives-ouvertes.fr/inria-00000552
Verification of programs with half-duplex communication . Information and Computation, pp.166-190, 2005. ,
A survey of authentication protocol literature : Version 1.0, 1997. ,
An NP decision procedure for protocol insecurity with XOR, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., pp.247-274, 2005. ,
DOI : 10.1109/LICS.2003.1210066
URL : https://hal.archives-ouvertes.fr/inria-00103954
Comparing state spaces in security protocol analysis In Automated Verification of Critical Systems, AVoCS'07, Electronic Notes in Theoretical Computer Science Comon-Lundh and V. Cortier. Security properties: two agents are sufficient, European Symposium on Programming, ESOP'03, pp.49-63, 2007. ,
Tree automata with one memory set constraints and cryptographic protocols, Theoretical Computer Science, vol.331, issue.1, pp.143-214, 2005. ,
DOI : 10.1016/j.tcs.2004.09.036
URL : https://hal.archives-ouvertes.fr/inria-00000553
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., pp.271-280, 2003. ,
DOI : 10.1109/LICS.2003.1210067
Combining Intruder Theories, International Colloquium on Automata, Languages and Programming, ICAPL'05, pp.639-651, 2005. ,
DOI : 10.1007/11523468_52
URL : https://hal.archives-ouvertes.fr/inria-00070512
Scyther -Semantics and Verification of Security Protocols Comon-Lundh and R. Treinen. Easy intruder deductions Verification: Theory and Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday, Lecture Notes in Computer Science, vol.2772, pp.225-242, 2003. ,
Easy intruder deduction problems with homomorphisms, Information Processing Letters, vol.97, issue.6, pp.213-218, 2006. ,
DOI : 10.1016/j.ipl.2005.11.008
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.96.2785
Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks, Journal of Automated Reasoning, vol.40, issue.2, pp.85-124, 2006. ,
DOI : 10.1007/s10817-005-9017-7
URL : https://hal.archives-ouvertes.fr/inria-00578855
Undecidability of Bounded Security Protocols, Formal Methods and Security Protocols , FMSP'99, 1999. ,
Multiset rewriting and the complexity of bounded security protocols, Proc. FloC'99, pp.247-311, 2004. ,
DOI : 10.3233/JCS-2004-12203
Iterating transducers, Journal of Logic and Algebraic Programming, pp.52-53109, 2002. ,
DOI : 10.1007/3-540-44585-4_27
The theory of ground rewrite systems is decidable, [1990] Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science, 1990. ,
DOI : 10.1109/LICS.1990.113750
Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer, Electronic Notes in Theoretical Computer Science, vol.171, issue.4, pp.23-36, 2007. ,
DOI : 10.1016/j.entcs.2007.02.053
Reachability Analysis over Term Rewriting Systems, Journal of Automated Reasoning, vol.37, issue.1?2, pp.3-4341, 2004. ,
DOI : 10.1007/s10817-004-6246-0
URL : https://hal.archives-ouvertes.fr/inria-00071609
How to Compose Presburger-Accelerations: Applications to Broadcast Protocols, Fundations of Software Technology and Theoretical Computer Science FSTTCS'02, pp.145-156, 2002. ,
DOI : 10.1007/3-540-36206-1_14
A Direct Symbolic Approach to Model Checking Pushdown Systems (extended abstract), Verification of Infinite State Systems, INFINITY'97, pp.27-39, 1997. ,
DOI : 10.1016/S1571-0661(05)80426-8
Rewriting for Cryptographic Protocol Verification, Conference on Automated Deduction, CADE'00, pp.271-290, 2000. ,
Abstraction and resolution modulo AC: How to verify Diffie???Hellman-like protocols automatically, The Journal of Logic and Algebraic Programming, vol.64, issue.2, pp.219-251, 2005. ,
DOI : 10.1016/j.jlap.2004.09.004
URL : http://doi.org/10.1016/j.jlap.2004.09.004
Regular tree languages and rewrite systems, Fundamenta Informatica, vol.24, issue.12, pp.157-174, 1995. ,
URL : https://hal.archives-ouvertes.fr/inria-00538882
Decidable approximations of term rewriting systems, Rewriting Techniques and Applications, RTA'96, volume 1103 of Lecture Notes in Computer Sciences, pp.362-376, 1996. ,
Transitive Closures of Regular Relations for Verifying Infinite-State Systems, Tools and Algorithms for Construction and Analysis of Systems, TACAS'00, pp.220-234, 2000. ,
DOI : 10.1007/3-540-46419-0_16
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, European Symposium on Programming, ESOP'05, pp.186-200, 2005. ,
DOI : 10.1007/978-3-540-31987-0_14
Automata-Based Analysis of Recursive Cryptographic Protocols, Symposium on Theoretical Aspects of Computer Science, STACS'04, pp.382-393, 2004. ,
DOI : 10.1007/978-3-540-24749-4_34
Lattice Automata: A Representation for Languages on Infinite Alphabets, and Some Applications to Verification, Static Analysis Symposium, SAS'07, pp.52-68, 2007. ,
DOI : 10.1007/978-3-540-74061-2_4
Intruder deduction for the equational theory of Abelian groups with distributive encryption, Information and Computation, vol.205, issue.4, pp.581-623, 2007. ,
DOI : 10.1016/j.ic.2006.10.008
URL : https://hal.archives-ouvertes.fr/hal-00496353
Automated analysis of cryptographic protocols using mur, Proceedings of the 1997 Conference on Security and Privacy (S&P-97), pp.141-153, 1997. ,
Models and Methods for the Automated Analysis of Security Protocols, 2007. ,
Abstracting cryptographic protocols with tree automata, Static Analysis Symposium, SAS'99, pp.149-163, 1999. ,
Static Validation of a Voting Protocol, Automated Reasoning for Security Protocol Analysis, pp.115-134, 2005. ,
DOI : 10.1016/j.entcs.2005.06.001
A framework for security analysis of mobile wireless networks, Theoretical Computer Science, vol.367, issue.1-2, pp.203-227, 2006. ,
DOI : 10.1016/j.tcs.2006.08.036
ACTAS : A System Design for Associative and Commutative Tree Automata Theory, Electronic Notes in Theoretical Computer Science, vol.124, issue.1, pp.97-111, 2005. ,
DOI : 10.1016/j.entcs.2004.07.017
Liveness and acceleration in parameterized verification Protocol insecurity with finite number of sessions is NP-complete, Computer Aided Verification, CAV'00 Computer Security Foundations Workshop CSFW '01, pp.328-343, 2000. ,
Regular Sets of Descendants by Some Rewrite Strategies, Rewriting Techniques and Applications, RTA'02, pp.129-143, 2002. ,
DOI : 10.1007/3-540-45610-4_10
Deterministic tree pushdown automata and monadic tree rewriting systems, Journal of Computer and System Sciences, vol.37, issue.3, pp.367-394, 1988. ,
DOI : 10.1016/0022-0000(88)90014-1
URL : http://doi.org/10.1016/0022-0000(88)90014-1
Athena: A new efficient automatic checker for security protocol analysis, Computer Security Fondations Workshop, CSFW'99, pp.192-202, 1999. ,
Regular protocols and attacks with regular knowledge, Conference on Automated Deduction, CADE'05, pp.377-391, 2005. ,
Handling exp,?? (and Timestamps) in Protocol Analysis, Foundations of Software Science and Computation Structures , FoSSaCS'06, pp.413-427, 2006. ,
DOI : 10.1007/11690634_28