Mobile values, new names, and secure communication, Proc. 28th Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Private authentication, Theoretical Computer Science, vol.322, issue.3, pp.427-476, 2004. ,
Optimal dynamic partial order reduction, ACM SIGPLAN Notices, vol.49, issue.1, pp.373-384, 2014. ,
Analysing unlinkability and anonymity using the applied pi calculus, Proc. 23rd Computer Security Foundations Symposium (CSF'10), pp.107-121, 2010. ,
Formal analysis of saml 2.0 web browser single sign-on: Breaking the saml-based single signon for google apps, Proc. 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008), pp.1-10, 2008. ,
The AVISPA Tool for the automated validation of internet security protocols and applications, Proc. 17th International Conference on Computer Aided Verification (CAV'05), 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00000408
Porridge, an OCaml library implementing POR techniques for checking trace equivalence of security protocols ,
URL : https://hal.archives-ouvertes.fr/hal-01821474
Partial order reduction for security protocols, Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15), vol.42, pp.497-510, 2015. ,
A Reduced Semantics for Deciding Trace Equivalence, Logical Methods in Computer Science, vol.13, issue.2, pp.1-48, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01906639
, POR for Security Protocols Equivalences : Beyond Action-Determinism, 2018.
Principles of Model Checking (Representation and Mind Series), 2008. ,
A survey of symbolic execution techniques, ACM Computing Surveys, vol.51, issue.3, 2018. ,
Provably repairing the ISO/IEC 9798 standard for entity authentication, Journal of Computer Security, vol.21, issue.6, pp.817-846, 2013. ,
Automated symbolic proofs of observational equivalence, Proc. 22nd ACM Conference on Computer and Communications Security (CCS'15), pp.1144-1155, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01337409
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, Proc. 14th Computer Security Foundations Workshop (CSFW'01), pp.82-96, 2001. ,
Formal verification of privacy for RFID systems, Proc. 23rd IEEE Computer Security Foundations Symposium (CSF'10), 2010. ,
Automated verification of equivalence properties of cryptographic protocols, Proc. 21st European Symposium on Programming Languages and Systems (ESOP'12), 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00732905
Apte: an algorithm for proving trace equivalence, Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'14), 2014. ,
Trace equivalence decision: Negative tests and non-determinism, Proc. 18th Conference on Computer and Communications Security (CCS'11), 2011. ,
Deciding equivalence-based properties using constraint solving, Theoretical Computer Science, vol.492, pp.1-39, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00881060
Deepsec: Deciding equivalence properties in security protocols -theory and practice, Proc. 39th IEEE Symposium on Security and Privacy (S&P'18), 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01698177
Partial order reductions for security protocol verification, Proc. 6th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.503-518, 2000. ,
Checking secrecy by means of partial order reduction, System Analysis and Modeling, 2005. ,
A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols, Journal of Logical and Algebraic Methods in Programming, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01906634
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, issue.4, pp.435-487, 2008. ,
Strong authentication for RFID systems using the AES algorithm, International Workshop on Cryptographic Hardware and Embedded Systems, pp.357-370, 2004. ,
Dynamic partial-order reduction for model checking software, ACM Sigplan Notices, vol.40, pp.110-121, 2005. ,
Partial-Order Methods for the Verification of Concurrent Systems, 1995. ,
A method for verifying privacy-type properties: the unbounded case, Proc. 37th IEEE Symposium on Security and Privacy (S&P'16), pp.564-581, 2016. ,
Breaking and fixing the Needham-Schroeder public-key protocol using FDR, Proc. 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), vol.1055, pp.147-166, 1996. ,
The TAMARIN prover for the symbolic analysis of security protocols, Proc. 25th International Conference on Computer Aided Verification (CAV'13), pp.696-701, 2013. ,
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols, Journal of Computer Security, vol.18, issue.4, pp.575-618, 2010. ,
Ten years of partial order reduction, Proc. 10th International Conference on Computer Aided Verification (CAV'98), 1998. ,