M. Abadi and C. Fournet, Mobile values, new names, and secure communication, 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

A. Bouhoula and F. Jacquemard, Automated induction for complex data structures, 2005.

A. Bouhoula and M. Rusinowitch, Implicit induction in conditional theories, Journal of Automated Reasoning, vol.31, issue.2, 1995.
DOI : 10.1007/BF00881856

URL : https://hal.archives-ouvertes.fr/inria-00074627

A. Bundy and G. Steel, Attacking group protocols by refuting incorrect inductive conjectures, Journal of Automated Reasoning, Special Issue on Automated Reasoning for Security Protocol Analysis, pp.1-28, 2005.

H. Comon and F. Jacquemard, Ground reducibility is exptimecomplete . Information and Computation, pp.123-153, 2003.
DOI : 10.1109/lics.1997.614922

URL : https://hal.archives-ouvertes.fr/inria-00578859

H. Comon-lundh, Handbook of Automated Reasoning, chapter Inductionless Induction, 2001.

C. Lawrence and . Paulson, The inductive approach to verifying cryptographic protocol, Journal of Computer Security, vol.6, pp.85-128, 1998.