How to prove security of communication protocols? a discussion on the soundness of formal models w.r.t. computational ones, STACS, pp.29-44, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00573590
Protocol insecurity with finite number of sessions is np-complete, 14th Computer Security Foundations Workshop (CSFW). IEEE, pp.174-190, 2001. ,
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proceedings of Computer Aided Verification (CAV), ser, pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Ltl model checking for security protocols Applied Non-Classical Logics, 2009. ,
DOI : 10.1109/csf.2007.24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.546.2317
Distributed memory LTL model checking, 2004. ,
DOI : 10.1007/3-540-45139-0_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.2064
A Note on On-the-Fly Verification Algorithms, TACAS, ser, pp.174-190, 2005. ,
DOI : 10.1007/978-3-540-31980-1_12
Depth-first search is inherently sequential, Information Processing Letters, vol.20, issue.5, pp.229-234, 1985. ,
DOI : 10.1016/0020-0190(85)90024-9
Parallel Scientific Computation. A structured approach using BSP and MPI, 2004. ,
DOI : 10.1093/acprof:oso/9780198529392.001.0001
Efficient onthe-fly model checking for ctl*, Proceedings of the 10th Annual IEEE Symposium on Logic in Computer Science (LICS), pp.388-398, 1995. ,
A bsp algorithm for the state space construction of security protocols, " in PDMC, IEEE Computer Society, pp.37-44, 2010. ,
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983. ,
DOI : 10.1109/TIT.1983.1056650
Algebras of coloured Petri nets, 2010. ,
A sweepline method for state space exploration, Proceedings of Tools and Algorithms for the Construction and Analysis of Systems (TACAS), ser, pp.450-464, 2001. ,
Distributed partial order reduction for security protocols, ENTCS, vol.198, pp.93-99, 2008. ,
Analysis models for security protocols, 2006. ,
Quickly prototyping Petri nets tools with SNAKES, Proceedings of the First International ICST Conference on Simulation Tools and Techniques for Communications Networks and Systems, pp.1-10, 2008. ,
DOI : 10.4108/ICST.SIMUTOOLS2008.3007
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.9790
Parallel Scripting with Python, Computing in Science & Engineering, vol.9, issue.6, 2007. ,
DOI : 10.1109/MCSE.2007.117
URL : https://hal.archives-ouvertes.fr/hal-00282403
SPORE: Security protocols open repository ,
Scyther -semantics and verification of security protocols, 2006. ,
A Comparative Analysis of Tools for Verification of Security Protocols, International Journal of Communications, Network and System Sciences, vol.03, issue.10, pp.779-787, 2010. ,
DOI : 10.4236/ijcns.2010.310104
Parallelizing the Mur?? verifier, Proceedings of Computer Aided Verification (CAV), ser. LNCS, O. Grumberg, pp.256-267, 1997. ,
DOI : 10.1007/3-540-63166-6_26
Analysis of security protocols by annotations Optimising the compilation of petri net models, SUMO'11, 2008. ,
Parallel state space construction for model-checking, Workshop on Model Checking of Software SPIN, 2001. ,
DOI : 10.1007/3-540-45139-0_14
URL : https://hal.archives-ouvertes.fr/inria-00072247
Model checkingparalì ele et réparti de réseaux de Petri colorés de haut-niveau, Conservatoire National des Arts et Métiers, 2008. ,
Parallel explicit state reachability analysis and state space construction, Second International Symposium on Parallel and Distributed Computing, 2003. Proceedings., pp.207-214, 2003. ,
DOI : 10.1109/ISPDC.2003.1267665
implified distributed model checking by localizing cycles, 2002. ,
Property driven distribution of nested dfs, Workshop on Verification and Computational Logic UK, pp.1-10, 2002. ,
Distributed Algorithms for SCC Decomposition, Journal of Logic and Computation, vol.21, issue.1, pp.23-44, 2011. ,
DOI : 10.1093/logcom/exp003
LTL with past and two-way veryweak alternating automata, 28th International Symposium on Mathematical Foundations of Computer Science (MFCS), ser. LNCS, 2003. ,
DiVinE: Parallel Distributed Model Checker (Tool paper), " in Parallel and Distributed Methods in Verification and High Performance Computational Systems Biology, pp.4-7, 2010. ,
BSP-WHY, Proceedings of the fourth international workshop on High-level parallel programming and applications, HLPP '10, 2010. ,
DOI : 10.1145/1863482.1863491
URL : https://hal.archives-ouvertes.fr/tel-00974977
Modelling, verification, and formal analysis of security properties in a P2P system, 2010 International Symposium on Collaborative Technologies and Systems, pp.543-548, 2010. ,
DOI : 10.1109/CTS.2010.5478474
Evaluating a peerto-peer storage system in presence of malicious peers, SPCLOUD-11, 2011. ,