How to prove security of communication protocols? a discussion on the soundness of formal models w.r.t. computational ones, STACS, pp.29-44, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00573590
LTL model checking for security protocols Applied Non-Classical Logics, 2009. ,
Parallel state space construction for model-checking, Workshop on Model Checking of Software SPIN, 2001. ,
DOI : 10.1007/3-540-45139-0_14
URL : https://hal.archives-ouvertes.fr/inria-00072247
Depth-first search is inherently sequential, Information Processing Letters, vol.20, issue.5, pp.229-234, 1985. ,
DOI : 10.1016/0020-0190(85)90024-9
Parallel Scientific Computation. A structured approach using BSP and MPI, 2004. ,
Efficient on-thefly model checking for CTL*, Logic in Computer Science (LICS), pp.388-398, 1995. ,
A BSP algorithm for the state space construction of security protocols, " in PDMC, IEEE Computer Society, pp.37-44, 2010. ,
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983. ,
DOI : 10.1109/TIT.1983.1056650
Algebras of coloured Petri nets, 2010. ,
Distributed partial order reduction for security protocols, ENTCS, vol.198, pp.93-99, 2008. ,
Bsp algorithms for LTL & CTL* model checking of security protocols, 2012. ,
A BSP Algorithm for On-the-fly Checking LTL Formulas on Security Protocols, 2012 11th International Symposium on Parallel and Distributed Computing, 2012. ,
DOI : 10.1109/ISPDC.2012.10
URL : https://hal.archives-ouvertes.fr/hal-00868689
A Comparative Analysis of Tools for Verification of Security Protocols, International Journal of Communications, Network and System Sciences, vol.03, issue.10, pp.779-787, 2010. ,
DOI : 10.4236/ijcns.2010.310104
Distributed memory LTL model checking, 2004. ,
DOI : 10.1007/3-540-45139-0_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.2064
Property driven distribution of nested dfs, Workshop on Verification and Computational Logic (VCL), pp.1-10, 2002. ,
CTL* model checking on a shared-memory architecture, Formal Methods in System Design, pp.135-155, 2006. ,
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification (CAV), ser. LNCS, pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
DiVinE: Parallel Distributed Model Checker, 2010 Ninth International Workshop on Parallel and Distributed Methods in Verification, and Second International Workshop on High Performance Computational Systems Biology, pp.4-7, 2010. ,
DOI : 10.1109/PDMC-HiBi.2010.9
Modelling, verification, and formal analysis of security properties in a P2P system, 2010 International Symposium on Collaborative Technologies and Systems, pp.543-548, 2010. ,
DOI : 10.1109/CTS.2010.5478474