Analysing Unlinkability and Anonymity Using the Applied Pi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, 2010. ,
DOI : 10.1109/CSF.2010.15
URL : http://www.cs.bham.ac.uk/%7Etpc/Papers/csf10.pdf
New privacy issues in mobile telephony, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.205-216, 2012. ,
DOI : 10.1145/2382196.2382221
StatVerif: Verification of stateful processes, Proc. 24th IEEE Computer Security Foundations Symposium (CSF'11, pp.33-47, 2011. ,
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Formal analysis of SAML 2.0 web browser single sign-on, Proceedings of the 6th ACM workshop on Formal methods in security engineering, FMSE '08, pp.1-10, 2008. ,
DOI : 10.1145/1456396.1456397
Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR, 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp.234-248, 2017. ,
DOI : 10.1109/CSF.2017.22
URL : https://hal.archives-ouvertes.fr/hal-01533694
Fully automated analysis of padding-based encryption in the computational model, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1247-1260, 2013. ,
DOI : 10.1145/2508859.2516663
URL : https://hal.archives-ouvertes.fr/hal-00935737
EasyCrypt: A Tutorial, Foundations of Security Analysis and Design VII -FOSAD 2012, 2013. ,
DOI : 10.1145/1594834.1480894
URL : https://hal.archives-ouvertes.fr/hal-01114366
Automated proofs of pairingbased cryptography, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.1156-1168, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01246713
Know Your Enemy, ACM Transactions on Information and System Security, vol.17, issue.2, pp.1-731, 2014. ,
DOI : 10.1145/2658996
Automated Symbolic Proofs of Observational Equivalence, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1144-1155, 2015. ,
DOI : 10.1007/978-3-540-79966-5_1
URL : https://hal.archives-ouvertes.fr/hal-01337409
OFMC: A symbolic model checker for security protocols, International Journal of Information Security, vol.7, issue.3, pp.181-208, 2005. ,
DOI : 10.1109/CSFW.2001.930145
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS, 2014 IEEE Symposium on Security and Privacy, pp.98-113, 2014. ,
DOI : 10.1109/SP.2014.14
URL : https://hal.archives-ouvertes.fr/hal-01102259
Automated verification of selected equivalences for security protocols, Journal of Logic and Algebraic Programming, 2008. ,
A computationally sound mechanized prover for security protocols, IEEE Symposium on Security and Privacy, pp.21-24, 2006. ,
Automated verification of selected equivalences for security protocols, The Journal of Logic and Algebraic Programming, vol.75, issue.1, pp.3-51, 2008. ,
DOI : 10.1016/j.jlap.2007.06.002
Automated reasoning for equivalences in the applied pi calculus with barriers, Computer Security Foundations Symposium (CSF), 2016 IEEE 29th, pp.310-324, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01423742
Dissecting unlinkability, 2014. ,
Automated Verification of Equivalence Properties of Cryptographic Protocols, ACM Transactions on Computational Logic, vol.17, issue.4, pp.1-2332, 2016. ,
DOI : 10.1007/3-540-48660-7_29
URL : https://hal.archives-ouvertes.fr/inria-00632564
Blind signatures for untraceable payments Advances in Cryptology: Proceedings of CRYPTO '82, pp.199-203, 1982. ,
Untraceable Electronic Cash, Advances in Cryptology: Proceedings of CRYPTO '88, pp.319-327, 1990. ,
DOI : 10.1007/0-387-34799-2_25
URL : https://link.springer.com/content/pdf/10.1007%2F0-387-34799-2_25.pdf
Trace equivalence decision, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011. ,
DOI : 10.1145/2046707.2046744
URL : http://kar.kent.ac.uk/46878/1/CCD-ccs11.pdf
An NP decision procedure for protocol insecurity with XOR, pp.261-270, 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00071889
A Lightweight RFID Protocol Using Substring, Embedded and Ubiquitous Computing (EUC), pp.422-431, 2007. ,
DOI : 10.1007/978-3-540-77092-3_37
The Finite Variant Property: How to Get Rid of Some Algebraic Properties, Term Rewriting and Applications, 16th International Conference, RTA. LNCS, pp.294-307, 2005. ,
DOI : 10.1007/978-3-540-32033-3_22
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, 20th International Conference on Computer Aided Verification (CAV'08). LNCS, pp.414-418, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
Automatic Verification of Privacy Properties in the Applied pi Calculus, Proceedings 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security, 2008. ,
DOI : 10.1007/978-0-387-09428-1_17
Algebraic Attacks on RFID Protocols, Lecture Notes in Computer Science, vol.29, issue.2, pp.38-51, 2009. ,
DOI : 10.1007/11601494_14
Attacks on RFID protocols (version 1.1) Cryptology ePrint Archive, Report, vol.310, p.310, 2008. ,
Beyond subtermconvergent equational theories in automated verification of stateful protocols, Principles of Security and Trust -6th International Conference, POST 2017, pp.117-140, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01430490
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR (Extended Version) Research report-l` es-Nancy, 2018. ,
Formal Analysis of E-Cash Protocols, Proceedings of the 12th International Conference on Security and Cryptography, pp.65-75, 2015. ,
DOI : 10.5220/0005544500650075
URL : https://hal.archives-ouvertes.fr/hal-01337410
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Foundations of Security Analysis and Design V, pp.1-50, 2009. ,
DOI : 10.1007/s10990-007-9000-6
URL : http://users.dsic.upv.es/%7Esescobar/papers/fosad07.pdf
Folding variant narrowing and optimal variant termination, Journal of Logic and Algebraic Programming, vol.81, pp.7-8, 2012. ,
DOI : 10.1007/978-3-642-16310-4_5
URL : http://www.dsic.upv.es/%7Esescobar/papers/wrla10.pdf
CPSA: a cryptographic protocol shapes analyzer, 2009. ,
A method for verifying privacytype properties: The unbounded case, IEEE Symposium on Security and Privacy, SP 2016, pp.564-581, 2016. ,
A method for unbounded verification of privacy-type properties, p.2049, 1710. ,
Secure Mobile RFID system against privacy and security problems, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007), p.2007, 2007. ,
DOI : 10.1109/SECPERU.2007.10
Automated analysis of security protocols with global state, Journal of Computer Security, vol.11, issue.1, pp.583-616, 2016. ,
DOI : 10.1109/SP.2014.19
URL : https://hal.archives-ouvertes.fr/hal-01351388
Reducing protocol analysis with XOR to the xor-free case in the horn theory based approach, Proceedings of the 2008 ACM Conference on Computer and Communications Security, pp.129-138, 2008. ,
RFID mutual authentication scheme based on synchronized secret information, Symposium on Cryptography and Information Security, 2006. ,
Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, pp.147-166, 1996. ,
DOI : 10.1007/3-540-61042-1_43
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-44, 1997. ,
DOI : 10.1109/CSFW.1997.596782
The TAMARIN Prover for the Symbolic Analysis of Security Protocols, CAV. LNCS, pp.696-701, 2013. ,
DOI : 10.1007/978-3-642-39799-8_48
Mobile subscriber wifi privacy In: Proceedings of Mobile Security Technologies (MoST'17), held as part of the IEEE Computer Society Security and Privacy Workshops, 2017. ,
A Hybrid Analysis for Security Protocols with State, Proc. 11th International Conference on Integrated Formal Methods (IFM'14), pp.272-287, 2014. ,
DOI : 10.1007/978-3-319-10181-1_17
A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA ,
DOI : 10.1007/978-3-319-11851-2_11
Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA, In: STM. pp, vol.8, issue.1/2, pp.163-178, 2010. ,
DOI : 10.1007/11805618_21
Formal Analysis of Key Exchange Protocols and Physical Protocols, ETH Zurich, 2012. ,
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012. ,
DOI : 10.1109/CSF.2012.25
https://tamarin-prover.github, pp.2018-2022, 2018. ,
The CL-Atse Protocol Analyser, 17th International Conference, RTA 2006, pp.277-286, 2006. ,
DOI : 10.1007/11805618_21
URL : https://hal.archives-ouvertes.fr/inria-00103573
The impossibility of computationally sound xor. IACR Cryptology ePrint Archive, p.389, 2010. ,