M. Abadi and R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Transactions on Software Engineering, vol.22, issue.1, pp.6-15, 1996.
DOI : 10.1109/32.481513

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.1311

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., p.82, 2001.
DOI : 10.1109/CSFW.2001.930138

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.5150

M. Burrows, M. Abadi, and R. Needham, A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990.
DOI : 10.1145/77648.77649

L. Buttyan, S. Staamann, and U. Wilhelm, A simple logic for authentication protocol design, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), pp.153-162, 1998.
DOI : 10.1109/CSFW.1998.683165

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.9993

J. Clark and J. Jacob, A survey of authentication protocol literature: Version 1.0, 1997.

A. John, J. Clark, and . Jacob, On the security of recent protocols, Inf. Process. Lett, vol.56, issue.3, pp.151-155, 1995.

J. F. Cas and . Cremers, Unbounded verification, falsification, and characterization of security protocols by pattern refinement, CCS '08: Proceedings of the 15th ACM conference on Computer and communications security, pp.119-128, 2008.

C. J. Cremers, Feasibility of multi-protocol attacks, First International Conference on Availability, Reliability and Security (ARES'06), pp.287-294, 2006.
DOI : 10.1109/ARES.2006.63

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.1557

C. J. Cremers, S. Mauw, and E. P. De-vink, Injective synchronisation: An extension of the authentication hierarchy, Theoretical Computer Science, vol.367, issue.1-2, pp.139-161, 2006.
DOI : 10.1016/j.tcs.2006.08.034

E. Dorothy, G. M. Denning, and . Sacco, Timestamps in key distribution protocols, Commun. ACM, vol.24, issue.8, pp.533-536, 1981.

B. Elliott, J. Dreier, and P. Lafourcade, Formal Analysis of Combinations of Secure Protocols (Extended Version), 2017.

T. Hwang and Y. Chen, On the security of SPLICE/AS ??? The authentication system in WIDE Internet, Information Processing Letters, vol.53, issue.2, pp.97-101, 1995.
DOI : 10.1016/0020-0190(94)00175-X

I. Kao and R. Chow, An efficient and secure authentication protocol using uncertified keys, ACM SIGOPS Operating Systems Review, vol.29, issue.3, pp.14-21, 1995.
DOI : 10.1145/206826.206832

J. Kelsey, B. Schneier, and D. Wagner, Protocol interactions and the chosen protocol attack, Proceedings of the 5th International Workshop on Security Protocols, pp.91-104, 1998.
DOI : 10.1007/BFb0028162

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.5994

G. Lowe, An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters, vol.56, issue.3, pp.131-133, 1995.
DOI : 10.1016/0020-0190(95)00144-2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.7797

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-44, 1997.
DOI : 10.1109/CSFW.1997.596782

G. Lowe, Towards a completeness result for model checking of security protocols, Journal of Computer Security, vol.7, issue.2-3, pp.89-146, 1999.
DOI : 10.3233/JCS-1999-72-302

A. Mathuria, A. R. Singh, P. V. Shravan, and R. Kirtankar, Some New Multi-Protocol Attacks, 15th International Conference on Advanced Computing and Communications (ADCOM 2007), pp.465-471, 2007.
DOI : 10.1109/ADCOM.2007.112

S. Meier, B. Schmidt, C. Cremers, and D. A. Basin, The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Computer Aided Verification -25th International Conference, CAV 2013 Proceedings, pp.696-701, 2013.
DOI : 10.1007/978-3-642-39799-8_48

R. Needham and M. Schroeder, Authentication revisited, ACM SIGOPS Operating Systems Review, vol.21, issue.1, pp.7-7, 1987.
DOI : 10.1145/24592.24593

M. Roger, M. D. Needham, and . Schroeder, Using encryption for authentication in large networks of computers, Commun. ACM, vol.21, issue.12, pp.993-999, 1978.

A. Perrig and D. Song, Looking for diamonds in the desert - extending automatic protocol generation to three-party authentication and key agreement protocols, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, p.64, 2000.
DOI : 10.1109/CSFW.2000.856926

D. Song, S. Berezin, and A. Perrig, Athena: a novel approach to efficient automatic security protocol analysis1, Journal of Computer Security, vol.9, issue.1-2, pp.47-74, 2001.
DOI : 10.3233/JCS-2001-91-203

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.2198

Y. C. Thomas, S. S. Woo, and . Lam, A lesson on authentication protocol design, SIGOPS Oper. Syst. Rev, vol.28, issue.3, pp.24-37, 1994.

S. Yamaguchi, K. Okayama, and H. Miyahara, The design and implementation of an authentication system for the wide area distributed environment, IEICE TRANSACTIONS on Information and Systems, vol.74, issue.11, pp.3902-3909, 1991.

H. Zhou and S. N. Foley, Fast automatic synthesis of security protocols using backward search, Proceedings of the 2003 ACM workshop on Formal methods in security engineering , FMSE '03, pp.1-10, 2003.
DOI : 10.1145/1035429.1035430

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.9776