J. Sattar, A. Aboud, and . Agoun, Analysis of a known offline e-coin system, International Journal of Computer Applications, 2014.

M. Abe and E. Fujisaki, How to date blind signatures, Advances in Cryptology -ASIACRYPT '96 Proceedings, pp.244-251, 1996.
DOI : 10.1007/BFb0034851

M. Abadi and C. Fournet, Mobile values, new names, and secure communication, The 28th Symposium on Principles of Programming Languages, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Backes, C. Hritcu, and M. Maffei, Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, 2008.
DOI : 10.1109/CSF.2008.26

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930138

S. Brands, Untraceable off-line cash in wallets with observers (extended abstract), Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology , CRYPTO '93, pp.302-318, 1994.

D. Chaum, A. Fiat, and M. Naor, Untraceable Electronic Cash, Advances in Cryptology: Proceedings of CRYPTO '88, pp.319-327, 1990.
DOI : 10.1007/0-387-34799-2_25

S. Canard and A. Gouget, Anonymity in Transferable E-cash, Applied Cryptography and Network Security, pp.207-223, 2008.
DOI : 10.1007/978-3-540-68914-0_13

URL : https://hal.archives-ouvertes.fr/hal-01110485

S. Canard, A. Gouget, and J. Traoré, Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash, Financial Cryptography and Data Security, 12th International Conference, 2008.
DOI : 10.1007/978-3-540-85230-8_19

D. Chaum, Blind Signatures for Untraceable Payments, Advances in Cryptology: Proceedings of CRYPTO '82, 1983.
DOI : 10.1007/978-1-4757-0602-4_18

G. Di and C. , A non-interactive electronic cash system, Algorithms and Complexity , Second Italian Conference, Italy, pp.109-124, 1994.

C. Yu-cheng, J. Yunus, and K. Seman, Estimations on the security aspect of brand's electronic cash scheme, 19th International Conference on Advanced Information Networking and Applications AINA, 2005.

I. B. Damgård, Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals, Proceedings on Advances in Cryptology, pp.328-335
DOI : 10.1007/0-387-34799-2_26

D. Stefano, G. D. Amiano, and . Crescenzo, Methodology for digital money based on general cryptographic tools, Advances in Cryptology -EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Italy, 1994.

J. Dreier, R. Giustolisi, A. Kassem, P. Lafourcade, G. Lenzini et al., Formal Analysis of Electronic Exams, Proceedings of the 11th International Conference on Security and Cryptography, pp.101-112, 2014.
DOI : 10.5220/0005050901010112

URL : https://hal.archives-ouvertes.fr/hal-01337413

S. Delaune, S. Kremer, and M. D. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

J. Dreier, P. Lafourcade, and Y. Lakhnech, A formal taxonomy of privacy in voting protocols, 2012 IEEE International Conference on Communications (ICC), pp.6710-6715, 2012.
DOI : 10.1109/ICC.2012.6364938

URL : https://hal.archives-ouvertes.fr/hal-01338064

J. Dreier, P. Lafourcade, and Y. Lakhnech, Formal Verification of e-Auction Protocols, Principles of Security and Trust, POST, pp.247-266, 2013.
DOI : 10.1007/978-3-642-36830-1_13

URL : https://hal.archives-ouvertes.fr/hal-01338031

D. Dolev and A. C. Yao, On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1983.

N. Ferguson, Single Term Off-Line Coins, Advances in Cryptology, Lecture Notes in Computer Science -EUROCRYPT '93, pp.318-328, 1994.
DOI : 10.1007/3-540-48285-7_28

C. Fan, V. Shi-ming, Y. Huang, and . Yu, User efficient recoverable off-line e-cash scheme with fast anonymity revoking, Mathematical and Computer Modelling, vol.58, issue.1-2, 2013.
DOI : 10.1016/j.mcm.2012.07.012

S. Kim and H. Oh, Making electronic refunds reusable, 2001.

R. Küsters and T. Truderung, Reducing protocol analysis with xor to the xor-free case in the horn theory based approach, Journal of Automated Reasoning, 2011.

Z. Luo, X. Cai-pang, and Y. Deng, Analyzing an Electronic Cash Protocol Using Applied Pi Calculus, Applied Cryptography and Network Security, 5th International Conference, 2007.
DOI : 10.1007/978-3-540-72738-5_6

T. Okamoto and K. Ohta, Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash, Proceedings on Advances in Cryptology , CRYPTO '89, pp.481-496, 1989.
DOI : 10.1007/0-387-34805-0_43

R. Marek, P. Ogiela, and . Sulkowski, Improved cryptographic protocol for digital coin exchange, Soft Computing and Intelligent Systems (SCIS), pp.1148-1151, 2014.

B. Pfitzmann, M. Schunter, and M. Waidner, How to Break Another ???Provably Secure??? Payment System, EU- ROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, France, pp.121-132, 1995.
DOI : 10.1007/3-540-49264-X_10

B. Pfitzmann and M. Waidner, How to Break and Repair a ???Provably Secure??? Untraceable Payment System, CRYPTO '91, 11th Annual International Cryptology Conference, pp.338-350, 1991.
DOI : 10.1007/3-540-46766-1_28

B. Schoenmakers, Basic security of the ecash payment system, Applied Cryptography, Course on Computer Security and Industrial Cryptography, pp.201-231

A. Thandar-swe and K. Kyaw, Formal analysis of secure e-cash transaction protocol, International Conference on Advances in Engineering and Technology