M. Burrows, M. Abadi, and R. M. Needham, A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990.
DOI : 10.1145/77648.77649

L. Gong, R. M. Needham, and R. Yahalom, Reasoning about belief in cryptographic protocols, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.234-248, 1990.
DOI : 10.1109/RISP.1990.63854

M. Abadi and A. D. Gordon, A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.1-70, 1999.
DOI : 10.1145/266420.266432

G. Lowe, Casper: A compiler for the analysis of security protocols, Journal of Computer Security, vol.6, issue.1-2, pp.53-84, 1998.
DOI : 10.3233/JCS-1998-61-204

A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, CAV 2005, pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

L. C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security, vol.6, issue.1-2, pp.85-128, 1998.
DOI : 10.3233/JCS-1998-61-205

J. Hughes and M. Warnier, The Coinductive Approach to Verifying Cryptographic Protocols, Algebraic Development Techniques, pp.268-283, 2003.
DOI : 10.3233/JCS-1998-61-205

G. Denker and J. K. Millen, Modeling Group Communication Protocols Using Multiset Term Rewriting, Electronic Notes in Theoretical Computer Science, vol.71, 2002.
DOI : 10.1016/S1571-0661(05)82527-7

URL : http://doi.org/10.1016/s1571-0661(05)82527-7

T. Genet and F. Klay, Rewriting for Cryptographic Protocol Verification, ) Automated Deduction -CADE-17, pp.271-290, 2000.
DOI : 10.1007/10721959_21

URL : https://hal.archives-ouvertes.fr/inria-00072731

L. Bozga, Y. Lakhnech, and M. Périn, Pattern-based abstraction for verifying secrecy in protocols, ETAPS 2003 and TACAS 2003, pp.299-314, 2003.

D. Monniaux, Abstracting cryptographic protocols with tree automata, Science of Computer Programming, vol.47, issue.2-3, pp.177-202, 2003.
DOI : 10.1016/S0167-6423(02)00132-6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. S. Jeffrey and R. Ley-wild, Dynamic model checking of C cryptographic protocol implementations, Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (fcs'06), 2006.

J. Goubault-larrecq and F. Parrennes, Cryptographic Protocol Analysis on Real C Code, VMCAI 2005, pp.363-379, 2005.
DOI : 10.1007/978-3-540-30579-8_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

K. Bhargavan, Provable implementations of security protocols, IEEE Symposium on Logic in Computer Science (LICS 2006), pp.345-346, 2006.

C. Breunesse, E. Hubbers, P. Koopman, W. Mostowski, M. Oostdijk et al., Testing the dutch epassport, 2006.

D. Dolev and A. C. Yao, On the security of public key protocols, Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, pp.350-357, 1981.

N. Lynch and M. Tuttle, Introduction to IO automata, CWI Quarterly, vol.3, issue.2, 1999.

N. Carriero and D. Gelernter, Linda in context, Communications of the ACM, vol.32, issue.4, pp.444-458, 1989.
DOI : 10.1145/63334.63337

O. Kupferman and M. Y. Vardi, Model Checking of Safety Properties, Formal Methods in System Design, vol.19, issue.3, pp.291-314, 2001.
DOI : 10.1007/3-540-48683-6_17

M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-oliet et al., The Maude 2.0 System, RTA 2003, pp.76-87, 2003.
DOI : 10.1007/3-540-44881-0_7

M. Gaudel and P. R. James, Testing algebraic data types and processes: A unifying theory. Formal Asp, Comput, vol.10, pp.5-6, 1998.
DOI : 10.1007/s001650050026

D. Angluin, Inference of Reversible Languages, Journal of the ACM, vol.29, issue.3, pp.741-765, 1982.
DOI : 10.1145/322326.322334