M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proc. 28th Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Abadi and C. Fournet, Private authentication, Theoretical Computer Science, vol.322, issue.3, pp.427-476, 2004.

P. Abdulla, S. Aronis, B. Jonsson, and K. Sagonas, Optimal dynamic partial order reduction, ACM SIGPLAN Notices, vol.49, issue.1, pp.373-384, 2014.

M. Arapinis, T. Chothia, E. Ritter, and M. Ryan, Analysing unlinkability and anonymity using the applied pi calculus, Proc. 23rd Computer Security Foundations Symposium (CSF'10), pp.107-121, 2010.

A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. T. Abad, Formal analysis of saml 2.0 web browser single sign-on: Breaking the saml-based single signon for google apps, Proc. 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008), pp.1-10, 2008.

A. Armando, The AVISPA Tool for the automated validation of internet security protocols and applications, Proc. 17th International Conference on Computer Aided Verification (CAV'05), 2005.
URL : https://hal.archives-ouvertes.fr/inria-00000408

D. Baelde, S. Delaune, and L. Hirschi, Porridge, an OCaml library implementing POR techniques for checking trace equivalence of security protocols
URL : https://hal.archives-ouvertes.fr/hal-01821474

D. Baelde, S. Delaune, and L. Hirschi, Partial order reduction for security protocols, Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15), vol.42, pp.497-510, 2015.

D. Baelde, S. Delaune, and L. Hirschi, A Reduced Semantics for Deciding Trace Equivalence, Logical Methods in Computer Science, vol.13, issue.2, pp.1-48, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01906639

D. Baelde, S. Delaune, and L. Hirschi, POR for Security Protocols Equivalences : Beyond Action-Determinism, 2018.

C. Baier and J. Katoen, Principles of Model Checking (Representation and Mind Series), 2008.

R. Baldoni, E. Coppa, D. C. .-d'elia, C. Demetrescu, and I. Finocchi, A survey of symbolic execution techniques, ACM Computing Surveys, vol.51, issue.3, 2018.

D. Basin, C. Cremers, and S. Meier, Provably repairing the ISO/IEC 9798 standard for entity authentication, Journal of Computer Security, vol.21, issue.6, pp.817-846, 2013.

D. Basin, J. Dreier, and R. Sasse, Automated symbolic proofs of observational equivalence, Proc. 22nd ACM Conference on Computer and Communications Security (CCS'15), pp.1144-1155, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01337409

B. Blanchet, An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, Proc. 14th Computer Security Foundations Workshop (CSFW'01), pp.82-96, 2001.

M. Bruso, K. Chatzikokolakis, and J. Den-hartog, Formal verification of privacy for RFID systems, Proc. 23rd IEEE Computer Security Foundations Symposium (CSF'10), 2010.

R. Chadha, C. Ciobâc?, and S. Kremer, Automated verification of equivalence properties of cryptographic protocols, Proc. 21st European Symposium on Programming Languages and Systems (ESOP'12), 2012.
URL : https://hal.archives-ouvertes.fr/hal-00732905

V. Cheval, Apte: an algorithm for proving trace equivalence, Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'14), 2014.

V. Cheval, H. Comon-lundh, and S. Delaune, Trace equivalence decision: Negative tests and non-determinism, Proc. 18th Conference on Computer and Communications Security (CCS'11), 2011.

V. Cheval, V. Cortier, and S. Delaune, Deciding equivalence-based properties using constraint solving, Theoretical Computer Science, vol.492, pp.1-39, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00881060

V. Cheval, S. Kremer, and I. Rakotonirina, Deepsec: Deciding equivalence properties in security protocols -theory and practice, Proc. 39th IEEE Symposium on Security and Privacy (S&P'18), 2018.
URL : https://hal.archives-ouvertes.fr/hal-01698177

E. Clarke, S. Jha, and W. Marrero, Partial order reductions for security protocol verification, Proc. 6th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.503-518, 2000.

C. J. Cremers and S. Mauw, Checking secrecy by means of partial order reduction, System Analysis and Modeling, 2005.

S. Delaune and L. Hirschi, A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols, Journal of Logical and Algebraic Methods in Programming, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01906634

S. Delaune, S. Kremer, and M. D. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, issue.4, pp.435-487, 2008.

M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong authentication for RFID systems using the AES algorithm, International Workshop on Cryptographic Hardware and Embedded Systems, pp.357-370, 2004.

C. Flanagan and P. Godefroid, Dynamic partial-order reduction for model checking software, ACM Sigplan Notices, vol.40, pp.110-121, 2005.

P. Godefroid, Partial-Order Methods for the Verification of Concurrent Systems, 1995.

L. Hirschi, D. Baelde, and S. Delaune, A method for verifying privacy-type properties: the unbounded case, Proc. 37th IEEE Symposium on Security and Privacy (S&P'16), pp.564-581, 2016.

G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, Proc. 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), vol.1055, pp.147-166, 1996.

S. Meier, B. Schmidt, C. J. Cremers, and D. Basin, The TAMARIN prover for the symbolic analysis of security protocols, Proc. 25th International Conference on Computer Aided Verification (CAV'13), pp.696-701, 2013.

S. Mödersheim, L. Viganò, and D. Basin, Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols, Journal of Computer Security, vol.18, issue.4, pp.575-618, 2010.

D. Peled, Ten years of partial order reduction, Proc. 10th International Conference on Computer Aided Verification (CAV'98), 1998.