R. Amadio and W. Charatonik, On Name Generation and Set-Based Analysis in the Dolev-Yao Model, CONCUR'02, pp.499-514, 2002.
DOI : 10.1007/3-540-45694-5_33

A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proc. of CAV'2005, pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

A. Armando, D. A. Basin, M. Bouallagui, Y. Chevalier, L. Compagna et al., The AVISS Security Protocol Analysis Tool, CAV '02, pp.349-353, 2002.
DOI : 10.1007/3-540-45657-0_27

URL : https://hal.archives-ouvertes.fr/inria-00100915

A. Armando and L. Compagna, An optimized intruder model for SAT-based modelchecking of security protocols, ENTCS, pp.91-108, 2005.

A. Project, AVISPA protocol library Available at http://www. avispa-project.org

D. Basin, S. Mödersheim, and L. Viganò, An On-the-Fly Model-Checker for Security Protocol Analysis, Proc. of ESORICS'03, pp.253-270, 2003.
DOI : 10.1007/978-3-540-39650-5_15

S. Bellovin and M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, p.72, 1992.
DOI : 10.1109/RISP.1992.213269

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001.
DOI : 10.1109/CSFW.2001.930138

K. P. Bogart, An Obvious Proof of Burnside's Lemma, The American Mathematical Monthly, vol.98, issue.10, pp.98927-928, 1991.
DOI : 10.2307/2324149

Y. Boichut, P. Héam, O. Kouchnarenko, and F. Oehl, Improvements on the Genet and Klay technique to automatically verify security protocols, Proc. AVIS'04, 2004.

M. Boreale, Symbolic Trace Analysis of Cryptographic Protocols, ICALP, 2001.
DOI : 10.1007/3-540-48224-5_55

L. Bozga, Y. Lakhnech, and M. Perin, HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols, Computer Aided Verification, 2003.
DOI : 10.1007/978-3-540-45069-6_23

W. Burnside, Theory of groups of finite order, p.1897

M. Burrows, M. Abadi, and R. Needham, A logic of authentication, Proc. 12th ACM Symposium on Operating System Principles (SOSP'89), pp.1-13, 1989.

M. Cheminod, I. C. Bertolotti, L. Durante, R. Sisto, and A. Valenzano, Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols, 2nd International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX '07), pp.153-160, 2007.
DOI : 10.1109/DEPCOS-RELCOMEX.2007.24

J. Clark and J. Jacob, A survey of authentication protocol literature, 1997.

H. Comon-lundh and V. Cortier, Security properties: two agents are sufficient, Science of Computer Programming, vol.50, issue.1-3, pp.51-71, 2004.
DOI : 10.1016/j.scico.2003.12.002

URL : https://hal.archives-ouvertes.fr/inria-00099981

R. Corin and S. Etalle, An Improved Constraint-Based System for the Verification of Security Protocols, SAS'02, pp.326-341, 2002.
DOI : 10.1007/3-540-45789-5_24

V. Cortier, S. Delaune, and P. Lafourcade, A survey of algebraic properties used in cryptographic protocols, Journal of Computer Security, vol.14, issue.1, pp.1-43, 2006.
DOI : 10.3233/JCS-2006-14101

URL : https://hal.archives-ouvertes.fr/inria-00000552

C. Cremers, Scyther -Semantics and Verification of Security Protocols, 2006.

C. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, CAV'08, pp.414-418, 2008.
DOI : 10.1007/978-3-540-70545-1_38

C. Cremers, Unbounded verification, falsification, and characterization of security protocols by pattern refinement, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.119-128, 2008.
DOI : 10.1145/1455770.1455787

C. Cremers and P. Lafourcade, Protocol tool comparison test archive

C. Cremers, S. Mauw, and E. De-vink, Injective synchronisation: An extension of the authentication hierarchy, Theoretical Computer Science, vol.367, issue.1-2, 2006.
DOI : 10.1016/j.tcs.2006.08.034

S. Delaune, S. Kremer, and G. Steel, Formal Analysis of PKCS#11, 2008 21st IEEE Computer Security Foundations Symposium, pp.331-344, 2008.
DOI : 10.1109/CSF.2008.16

B. Donovan, P. Norris, and G. Lowe, Analyzing a library of security protocols using Casper and FDR, Proceedings of the Workshop on Formal Methods and Security Protocols, 1999.

N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov, Undecidability of bounded security protocols, Proc. Workshop FMSP'99, 1999.

C. Hoare, Communicating Sequential Processes, 1985.

M. Hussain and D. Seret, A comparative study of security protocols validation tools: HERMES vs. AVISPA, 2006 8th International Conference Advanced Communication Technology, pp.303-308, 2006.
DOI : 10.1109/ICACT.2006.205974

F. Jacquemard, Security protocols open repository

A. Kerber, Applied finite group actions, volume 19 of Algorithms and Combinatorics, 1999.

G. Lowe, Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, TACAS '96, pp.147-166, 1996.
DOI : 10.1007/3-540-61042-1_43

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-44, 1997.
DOI : 10.1109/CSFW.1997.596782

G. Lowe, Casper: A compiler for the analysis of security protocols, Journal of Computer Security, vol.6, issue.1-2, pp.53-84, 1998.
DOI : 10.3233/JCS-1998-61-204

C. Meadows, Analyzing the needham-schroeder public-key protocol: A comparison of two approaches, ESORICS'96, pp.351-364, 1996.

C. Meadows, Language generation and verification in the NRL protocol analyzer, Proc. CSFW'96, pp.48-62, 1996.

J. Millen, A necessarily parallel attack, Workshop on Formal Methods and Security Protocols, 1999.

J. Mitchell, M. Mitchell, and U. Stern, Automated analysis of cryptographic protocols using Murphi, IEEE Symposium on Security and Privacy, 1997.

R. Needham and M. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM, vol.21, issue.12, pp.993-999, 1978.
DOI : 10.1145/359657.359659

L. C. Paulson, Inductive analysis of the Internet protocol TLS, ACM Transactions on Information and System Security, vol.2, issue.3, pp.332-351, 1999.
DOI : 10.1145/322510.322530

A. W. Roscoe, Model-checking CSP, 1994.

A. W. Roscoe, Modelling and verifying key-exchange protocols using CSP and FDR, Proceedings The Eighth IEEE Computer Security Foundations Workshop, 1995.
DOI : 10.1109/CSFW.1995.518556

D. Song, S. Berezin, and A. Perrig, Athena: a novel approach to efficient automatic security protocol analysis1, Journal of Computer Security, vol.9, issue.1-2, pp.47-74, 2001.
DOI : 10.3233/JCS-2001-91-203

E. Tsalapati, Analysis of pkcs#11 using avispa tools, 2007.

M. Turuani, The CL-Atse Protocol Analyser, Proc. RTA'06, pp.277-286, 2006.
DOI : 10.1007/11805618_21

URL : https://hal.archives-ouvertes.fr/inria-00103573

L. Viganò, Automated Security Protocol Analysis With the AVISPA Tool, Electronic Notes in Theoretical Computer Science, vol.155, pp.61-86, 2006.
DOI : 10.1016/j.entcs.2005.11.052