Mobile values, new names, and secure communication, 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Automated induction for complex data structures, 2005. ,
Implicit induction in conditional theories, Journal of Automated Reasoning, vol.31, issue.2, 1995. ,
DOI : 10.1007/BF00881856
URL : https://hal.archives-ouvertes.fr/inria-00074627
Attacking group protocols by refuting incorrect inductive conjectures, Journal of Automated Reasoning, Special Issue on Automated Reasoning for Security Protocol Analysis, pp.1-28, 2005. ,
Ground reducibility is exptimecomplete . Information and Computation, pp.123-153, 2003. ,
DOI : 10.1109/lics.1997.614922
URL : https://hal.archives-ouvertes.fr/inria-00578859
Handbook of Automated Reasoning, chapter Inductionless Induction, 2001. ,
The inductive approach to verifying cryptographic protocol, Journal of Computer Security, vol.6, pp.85-128, 1998. ,