L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981.
DOI : 10.1145/358790.358797

D. Otway and O. Rees, Efficient and timely mutual authentication, ACM SIGOPS Operating Systems Review, vol.21, issue.1, pp.8-10, 1987.
DOI : 10.1145/24592.24594

L. Gong, Using one-way functions for authentication, ACM SIGCOMM Computer Communication Review, vol.19, issue.5, pp.8-11, 1989.
DOI : 10.1145/74681.74682

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.4472

S. Bellovin and M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.72-84, 1992.
DOI : 10.1109/RISP.1992.213269

URL : http://academiccommons.columbia.edu/download/fedora_content/download/ac:127104/CONTENT/neke.pdf

C. Boyd, A class of flexible and efficient key management protocols, Proceedings 9th IEEE Computer Security Foundations Workshop, 1996.
DOI : 10.1109/CSFW.1996.503685

L. Fan, J. Li, and H. Zhu, An enhancement of timestamp-based password authentication scheme, Computers & Security, vol.21, issue.7, pp.665-667, 2002.
DOI : 10.1016/S0167-4048(02)01118-5

T. Chen, W. Lee, and G. Horng, Secure SAS-like password authentication schemes, Computer Standards & Interfaces, vol.27, issue.1, pp.25-31, 2004.
DOI : 10.1016/j.csi.2004.02.004

S. W. Lee, H. S. Kim, and K. Y. Yoo, Improved efficient remote user authentication scheme using smart cards, IEEE Transactions on Communications, vol.50, issue.2, pp.565-567, 2004.

M. Hwang, C. Lee, and Y. Tang, A simple remote user authentication scheme, Mathematical and Computer Modelling, vol.36, issue.1-2, pp.103-107, 2002.
DOI : 10.1016/S0895-7177(02)00106-1

E. Yoon, E. Ryu, and K. Yoo, An improvement of Hwang???Lee???Tang's simple remote user authentication scheme, Computers & Security, vol.24, issue.1, pp.50-56, 2005.
DOI : 10.1016/j.cose.2004.06.004

C. Li, C. Lee, and L. Wang, A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels, Journal of Information Assurance and Security, vol.5, issue.1, pp.201-208, 2010.

S. Kalsoom and S. Ziauddin, Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels, International Journal of Machine Learning and Computing, vol.3, issue.5, 2012.
DOI : 10.7763/IJMLC.2013.V3.348

H. Abadi and R. Needham, Prudent engineering practice for cryptographic protocols, Research in Security and Privacy, pp.122-136, 1994.
DOI : 10.1109/risp.1994.296587

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.1311

M. Burrows, M. Abadi, R. Needham, and G. Lowe, A Logic of Authentication, Software -Concepts and Tools, pp.233-271, 1989.
DOI : 10.1098/rspa.1989.0125

J. Mitchell, M. Mitchell, and U. Stern, Automated analysis of cryptographic protocols using Mur-phi, IEEE Symposium on Security and Privacy, pp.141-151, 1997.

D. X. Song, S. Berezin, and A. Perrig, Athena: a novel approach to efficient automatic security protocol analysis1, Journal of Computer Security, vol.9, issue.1-2, pp.47-74, 2001.
DOI : 10.3233/JCS-2001-91-203

C. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Computer Aided Verification, 2008.
DOI : 10.1007/978-3-540-70545-1_38

D. Basin and C. Cremers, Evaluation of ISO/IEC 9798 protocols version 2.0, 2011.

A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, 17th International Conference on Computer Aided Verification (CAV), 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

L. Vigano, Automated Security Protocol Analysis With the AVISPA Tool, Electronic Notes in Theoretical Computer Science, vol.155, issue.0, pp.61-86, 2006.
DOI : 10.1016/j.entcs.2005.11.052

Y. Boichut, T. Genet, Y. Glouche, and O. Heen, Using animation to improve formal specifications of security protocols, 2nd Conference on Security in Network Architectures and Information Systems, pp.169-182, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00468718