Automated parallelization of discrete statespace generation, Journal of Parallel and Distributed Computing, vol.4, issue.2, pp.153-167, 1997. ,
Dynamic State Space Partitioning for External Memory Model Checking, Proceedings of Formal Methods In Computer Sciences (FMICS), ser. LNCS, vol.5825, pp.70-85, 2009. ,
Load balancing parallel explicit state model checking, ENTCS, vol.128, pp.19-34, 2005. ,
Parallel state space construction for model-checking, Workshop on Model Checking of Software SPIN, 2001. ,
URL : https://hal.archives-ouvertes.fr/inria-00072247
Distributed memory LTL model checking, 2004. ,
Model checking paralléle et réparti de réseaux de Petri colorés de haut-niveau, Conservatoire National des Arts et Métiers, 2008. ,
How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC, Workshop on Real-life Cryptographic Protocols and Standardization, 2010. ,
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983. ,
SAT-based model-checking for security protocols analysis, Int. J. Inf. Sec, vol.7, issue.1, pp.3-32, 2008. ,
LTL model checking for security protocols, Proceedings of CSF, pp.385-396, 2007. ,
Analysis of security protocols by annotations, 2008. ,
The AVISPA tool for the automated validation of Internet security protocols and applications, Proceedings of Computer Aided Verification (CAV), ser, vol.3576, pp.281-285, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00000408
Scyther -semantics and verification of security protocols, 2006. ,
Questions and Answers about BSP, Scientific Programming, vol.6, issue.3, pp.249-274, 1997. ,
, Parallel Scientific Computation. A structured approach using BSP and MPI, 2004.
Algebras of coloured Petri nets, 2009. ,
URL : https://hal.archives-ouvertes.fr/tel-02309973
A sweep-line method for state space exploration, Proceedings of Tools and Algorithms for the Construction and Analysis of Systems (TACAS), ser, vol.2031, pp.450-464, 2001. ,
Quickly prototyping Petri nets tools with SNAKES, ser. ACM Digital Library. ACM, pp.1-10, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-02309814
Parallel scripting with Python, Computing in Science & Engineering, vol.9, issue.6, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00282403
SPORE: Security protocols open repository ,
Distributed-memory model checking with SPIN, Proceedings of SPIN, ser, pp.22-39, 1999. ,
Probability, parallelism and the state space exploration problem, Proceedings of Computer Performance Evaluation-Modeling, Techniques and Tools (TOOLS), ser, pp.165-179, 1998. ,
Achieving scalability in parallel reachability analysis of very large circuits, Proceedings of Computer Aided Verification (CAV), ser, pp.20-35, 1855. ,
Parallel explicit state reachability analysis and state space construction, Proceedings of ISPDC, pp.207-214, 2003. ,
A state space distributed polivy based on abstract interpretation, ENTCS, vol.128, pp.35-45, 2005. ,
Verification of copy-protection cryptographic protocol using approximations of term rewriting systems, Workshop on Issues in the Theory of Security (WITS), 2003. ,
Modelling, verification, and formal analysis of security properties in a P2P system, Workshop on Collaboration and Security (COLSEC'10), ser. IEEE Digital Library, pp.543-548, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-02310070