J. Sattar, A. Aboud, and . Agoun, Article: Analysis of a known offline ecoin system, International Journal of Computer Applications, vol.98, issue.15, pp.27-30, 2014.

A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., Laurent Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications, Computer Aided Verification , 17th International Conference, CAV, UK, pp.281-285, 2005.

M. Abe and E. Fujisaki, How to date blind signatures, Advances in Cryptology -ASIACRYPT '96 Proceedings, pp.244-251, 1996.
DOI : 10.1007/BFb0034851

M. Abadi and C. Fournet, Mobile values, new names, and secure communication, The 28th Symposium on Principles of Programming Languages, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001.
DOI : 10.1109/CSFW.2001.930138

S. Brands, Untraceable off-line cash in wallets with observers (extended abstract), Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '93, pp.302-318, 1994.

D. Chaum, A. Fiat, and M. Naor, Untraceable electronic cash Anonymity in transferable e-cash, Advances in Cryptology: Proceedings of CRYPTO '88CG08] Sébastien Canard and Aline Gouget Applied Cryptography and Network Security, pp.319-327, 1990.

D. Chaum, Blind Signatures for Untraceable Payments, Advances in Cryptology: Proceedings of CRYPTO '82, pp.199-203, 1983.
DOI : 10.1007/978-1-4757-0602-4_18

G. Di and C. , A non-interactive electronic cash system, Algorithms and Complexity, Second Italian Conference, Italy, pp.109-124, 1994.

C. Yu-cheng, J. Yunus, and K. Seman, Estimations on the security aspect of brand's electronic cash scheme, 19th International Conference on Advanced Information Networking and Applications, pp.28-30, 2005.

I. B. Damgårdamiano and G. D. Crescenzo, Payment systems and credential mechanisms with provable security against abuse by individuals Methodology for digital money based on general cryptographic tools, Proceedings on Advances in Cryptology Advances in Cryptology -EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques Proceedings, volume 950 of Lecture Notes in Computer Science, pp.328-335, 1990.

J. Dreier, A. Kassem, and P. Lafourcade, Formal analysis of ecash protocols, SECRYPT 2015 -Proceedings of the 12th International Conference on Security and Cryptography, pp.20-22
URL : https://hal.archives-ouvertes.fr/hal-01337410

S. Delaune, S. Kremer, M. D. Ryan-andrew, and C. Yao, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487198, 1983.
DOI : 10.3233/JCS-2009-0340

N. Ferguson, Single Term Off-Line Coins, Advances in Cryptology, Lecture Notes in Computer Science -EUROCRYPT '93, pp.318-328, 1994.
DOI : 10.1007/3-540-48285-7_28

C. Fan, V. Shi-ming, Y. Huang, and . Yu, User efficient recoverable off-line e-cash scheme with fast anonymity revoking, Mathematical and Computer Modelling, vol.58, issue.1-2, pp.227-237175, 2002.
DOI : 10.1016/j.mcm.2012.07.012

R. Küsters and T. Truderung, Reducing Protocol Analysis with XOR to the XOR-Free Case in the Horn Theory Based Approach, Journal of Automated Reasoning, vol.50, issue.1???3, pp.325-352, 2011.
DOI : 10.1007/11532231_25

[. Luo, X. Cai-pang, and Y. Deng, Analyzing an Electronic Cash Protocol Using Applied Pi Calculus, Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, China, pp.87-103, 2007.
DOI : 10.1007/978-3-540-72738-5_6

R. Marek, P. Ogiela, and . Sulkowski, Improved cryptographic protocol for digital coin exchange, Soft Computing and Intelligent Systems (SCIS), pp.1148-1151, 2014.

H. Peterson and G. Poupard, Efficient scalable fair cash with off-line extortion prevention, Proceedings of the First International Conference on Information and Communication Security, ICICS '97, pp.463-477, 1997.
DOI : 10.1007/BFb0028503

B. Pfitzmann, M. Schunter, and M. Waidner, How to Break Another ???Provably Secure??? Payment System, EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques , France, pp.121-132, 1995.
DOI : 10.1007/3-540-49264-X_10

B. Pfitzmann and M. Waidner, How to break and repair A " provably secure " untraceable payment system Basic security of the ecash payment system, CRYPTO '91, 11th Annual International Cryptology Conference Applied Cryptography, Course on Computer Security and Industrial Cryptography, pp.338-350, 1991.

A. Thandar-swe and K. Kyaw, Formal analysis of secure e-cash transaction protocol, International Conference on Advances in Engineering and Technology, ICAET '2014, 2014.