On Name Generation and Set-Based Analysis in the Dolev-Yao Model, CONCUR'02, pp.499-514, 2002. ,
DOI : 10.1007/3-540-45694-5_33
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proc. of CAV'2005, pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
The AVISS Security Protocol Analysis Tool, CAV '02, pp.349-353, 2002. ,
DOI : 10.1007/3-540-45657-0_27
URL : https://hal.archives-ouvertes.fr/inria-00100915
An optimized intruder model for SAT-based modelchecking of security protocols, ENTCS, pp.91-108, 2005. ,
AVISPA protocol library Available at http://www. avispa-project.org ,
An On-the-Fly Model-Checker for Security Protocol Analysis, Proc. of ESORICS'03, pp.253-270, 2003. ,
DOI : 10.1007/978-3-540-39650-5_15
Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, p.72, 1992. ,
DOI : 10.1109/RISP.1992.213269
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001. ,
DOI : 10.1109/CSFW.2001.930138
An Obvious Proof of Burnside's Lemma, The American Mathematical Monthly, vol.98, issue.10, pp.98927-928, 1991. ,
DOI : 10.2307/2324149
Improvements on the Genet and Klay technique to automatically verify security protocols, Proc. AVIS'04, 2004. ,
Symbolic Trace Analysis of Cryptographic Protocols, ICALP, 2001. ,
DOI : 10.1007/3-540-48224-5_55
HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols, Computer Aided Verification, 2003. ,
DOI : 10.1007/978-3-540-45069-6_23
Theory of groups of finite order, p.1897 ,
A logic of authentication, Proc. 12th ACM Symposium on Operating System Principles (SOSP'89), pp.1-13, 1989. ,
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols, 2nd International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX '07), pp.153-160, 2007. ,
DOI : 10.1109/DEPCOS-RELCOMEX.2007.24
A survey of authentication protocol literature, 1997. ,
Security properties: two agents are sufficient, Science of Computer Programming, vol.50, issue.1-3, pp.51-71, 2004. ,
DOI : 10.1016/j.scico.2003.12.002
URL : https://hal.archives-ouvertes.fr/inria-00099981
An Improved Constraint-Based System for the Verification of Security Protocols, SAS'02, pp.326-341, 2002. ,
DOI : 10.1007/3-540-45789-5_24
A survey of algebraic properties used in cryptographic protocols, Journal of Computer Security, vol.14, issue.1, pp.1-43, 2006. ,
DOI : 10.3233/JCS-2006-14101
URL : https://hal.archives-ouvertes.fr/inria-00000552
Scyther -Semantics and Verification of Security Protocols, 2006. ,
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, CAV'08, pp.414-418, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
Unbounded verification, falsification, and characterization of security protocols by pattern refinement, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.119-128, 2008. ,
DOI : 10.1145/1455770.1455787
Protocol tool comparison test archive ,
Injective synchronisation: An extension of the authentication hierarchy, Theoretical Computer Science, vol.367, issue.1-2, 2006. ,
DOI : 10.1016/j.tcs.2006.08.034
Formal Analysis of PKCS#11, 2008 21st IEEE Computer Security Foundations Symposium, pp.331-344, 2008. ,
DOI : 10.1109/CSF.2008.16
Analyzing a library of security protocols using Casper and FDR, Proceedings of the Workshop on Formal Methods and Security Protocols, 1999. ,
Undecidability of bounded security protocols, Proc. Workshop FMSP'99, 1999. ,
Communicating Sequential Processes, 1985. ,
A comparative study of security protocols validation tools: HERMES vs. AVISPA, 2006 8th International Conference Advanced Communication Technology, pp.303-308, 2006. ,
DOI : 10.1109/ICACT.2006.205974
Security protocols open repository ,
Applied finite group actions, volume 19 of Algorithms and Combinatorics, 1999. ,
Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, TACAS '96, pp.147-166, 1996. ,
DOI : 10.1007/3-540-61042-1_43
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-44, 1997. ,
DOI : 10.1109/CSFW.1997.596782
Casper: A compiler for the analysis of security protocols, Journal of Computer Security, vol.6, issue.1-2, pp.53-84, 1998. ,
DOI : 10.3233/JCS-1998-61-204
Analyzing the needham-schroeder public-key protocol: A comparison of two approaches, ESORICS'96, pp.351-364, 1996. ,
Language generation and verification in the NRL protocol analyzer, Proc. CSFW'96, pp.48-62, 1996. ,
A necessarily parallel attack, Workshop on Formal Methods and Security Protocols, 1999. ,
Automated analysis of cryptographic protocols using Murphi, IEEE Symposium on Security and Privacy, 1997. ,
Using encryption for authentication in large networks of computers, Communications of the ACM, vol.21, issue.12, pp.993-999, 1978. ,
DOI : 10.1145/359657.359659
Inductive analysis of the Internet protocol TLS, ACM Transactions on Information and System Security, vol.2, issue.3, pp.332-351, 1999. ,
DOI : 10.1145/322510.322530
Model-checking CSP, 1994. ,
Modelling and verifying key-exchange protocols using CSP and FDR, Proceedings The Eighth IEEE Computer Security Foundations Workshop, 1995. ,
DOI : 10.1109/CSFW.1995.518556
Athena: a novel approach to efficient automatic security protocol analysis1, Journal of Computer Security, vol.9, issue.1-2, pp.47-74, 2001. ,
DOI : 10.3233/JCS-2001-91-203
Analysis of pkcs#11 using avispa tools, 2007. ,
The CL-Atse Protocol Analyser, Proc. RTA'06, pp.277-286, 2006. ,
DOI : 10.1007/11805618_21
URL : https://hal.archives-ouvertes.fr/inria-00103573
Automated Security Protocol Analysis With the AVISPA Tool, Electronic Notes in Theoretical Computer Science, vol.155, pp.61-86, 2006. ,
DOI : 10.1016/j.entcs.2005.11.052