Mobile values, new names, and secure communication, Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '01, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, pp.107-121, 2010. ,
DOI : 10.1109/CSF.2010.15
SAT-based model-checking for security protocols analysis, International Journal of Information Security, vol.9, issue.1, pp.3-32, 2008. ,
DOI : 10.3233/JCS-2001-91-203
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, 2017 IEEE Symposium on Security and Privacy (SP), pp.483-502, 2017. ,
DOI : 10.1109/SP.2017.26
URL : https://hal.archives-ouvertes.fr/hal-01575920
Vérification automatique de protocoles cryptographiques : modèle formel et modèle calculatoire Automatic verification of security protocols: formal model and computational model. Mémoire d'habilitation à diriger des recherches, 2008. ,
Symbolic and computational mechanized verification of the ar- inc823 avionic protocols, 30th IEEE Computer Security Foundations Symposium (CSF'17), pp.68-82, 2017. ,
Automated verification of selected equivalences for security protocols, The Journal of Logic and Algebraic Programming, vol.75, issue.1, pp.3-51, 2008. ,
DOI : 10.1016/j.jlap.2007.06.002
Fast planning through planning graph analysis, Artificial Intelligence, vol.90, issue.1-2, pp.281-300, 1997. ,
DOI : 10.1016/S0004-3702(96)00047-1
Automated verification of equivalence properties of cryptographic protocols, 21th European Symposium on Programming (ESOP'12), 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00732905
APTE: An Algorithm for Proving Trace Equivalence, Proceedings of the 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'14), pp.587-592, 2014. ,
DOI : 10.1007/978-3-642-54862-8_50
Deciding equivalence-based properties using constraint solving, Theoretical Computer Science, vol.492, pp.1-39, 2013. ,
DOI : 10.1016/j.tcs.2013.04.016
URL : https://hal.archives-ouvertes.fr/hal-00881060
Deepsec: Deciding equivalence properties in security protocols -theory and practice, 39th IEEE Symposium on Security and Privacy (S&P'18), pp.525-542, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01698177
Typing Messages for Free in Security Protocols: The Case of Equivalence Properties, Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), pp.372-386, 2014. ,
DOI : 10.1007/978-3-662-44584-6_26
Checking Trace Equivalence: How to Get Rid of Nonces?, Proceedings of the 20th European Symposium ,
DOI : 10.1007/BFb0055718