, See supplementary files attached to this report

, 5G PPP phase 1 security landscape, 5G-PPP White-Paper Phase-1-Security-Landscape, 2017.

M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Arapinis, T. Chothia, E. Ritter, and M. Ryan, Analysing unlinkability and anonymity using the applied pi calculus, Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, pp.107-121, 2010.

M. Arapinis, L. I. Mancini, E. Ritter, M. Ryan, N. Golde et al., New privacy issues in mobile telephony: fix and verification, the ACM Conference on Computer and Communications Security, CCS'12, pp.205-216, 2012.

M. Arapinis, J. Phillips, E. Ritter, and M. D. Ryan, StatVerif: Verification of stateful processes, Journal of Computer Security, vol.22, issue.5, pp.743-821, 2014.

A. Armando, The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures, Tools and Algorithms for the Construction and Analysis of Systems -18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, vol.2012, pp.267-282, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00759725

D. A. Basin, J. Dreier, and R. Sasse, Automated symbolic proofs of observational equivalence, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.1144-1155, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01337409

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, 14th IEEE Computer Security Foundations Workshop, pp.82-96, 2001.

B. Blanchet, M. Abadi, and C. Fournet, Automated verification of selected equivalences for security protocols, J. Log. Algebr. Program, vol.75, issue.1, pp.3-51, 2008.

R. Borgaonkar, L. Hirschi, S. Park, and A. Shaik, New privacy threat on 3G, 4G, and upcoming 5G AKA protocols, PoPETs, vol.2019, issue.3, pp.108-127, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02368896

A. Bruni, S. Mödersheim, F. Nielson, and H. R. Nielson, Set-Pi: Set membership p-calculus, IEEE 28th Computer Security Foundations Symposium, pp.185-198, 2015.

M. Brusò, K. Chatzikokolakis, and J. Den-hartog, Formal verification of privacy for RFID systems, Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, pp.75-88, 2010.

M. Brusò, K. Chatzikokolakis, S. Etalle, and J. Den-hartog, Revised Selected Papers, ser. Lecture Notes in Computer Science, Trustworthy Global Computing -7th International Symposium, TGC 2012, vol.8191, pp.129-144, 2012.

V. Cheval, V. Cortier, and M. Turuani, A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif, 31st IEEE Computer Security Foundations Symposium, pp.344-358, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01900088

V. Cheval, S. Kremer, and I. Rakotonirina, The DEEPSEC prover, Computer Aided Verification -30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC, vol.10982, pp.28-36, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01763138

J. Dreier, L. Hirschi, S. Radomirovic, and R. Sasse, Automated unbounded verification of stateful cryptographic protocols with exclusive or, 31st IEEE Computer Security Foundations Symposium, pp.359-373, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01780603

P. Fouque, C. Onete, and B. Richard, Achieving better privacy for the 3GPP AKA protocol, PoPETs, vol.2016, issue.4, pp.255-275, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01510801

L. Hirschi, D. Baelde, and S. Delaune, A method for unbounded verification of privacy-type properties, Journal of Computer Security, vol.27, issue.3, pp.277-342, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02368832

, ISO 15408-2: Common criteria for information technology security evaluation -part 2: Security functional components, 2009.

A. Juels and S. A. Weis, Defining strong privacy for RFID, ACM Trans. Inf. Syst. Secur, vol.13, issue.1, pp.1-7, 2009.

A. Koutsos, The 5G-AKA authentication protocol privacy, IEEE European Symposium on Security and Privacy, vol.2019, pp.464-479, 2019.

S. Kremer and R. Künnemann, Automated analysis of security protocols with global state, Journal of Computer Security, vol.24, issue.5, pp.583-616, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01091241

S. Meier, B. Schmidt, C. Cremers, and D. A. Basin, The TAMARIN prover for the symbolic analysis of security protocols, Computer Aided Verification -25th International Conference, CAV 2013, pp.696-701, 2013.

S. Mödersheim and A. Bruni, AIF-?: Set-based protocol abstraction with countable families, Principles of Security and Trust -5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, vol.9635, pp.233-253, 2016.

S. Mödersheim and L. Viganò, Alpha-beta privacy, ACM Trans. Priv. Secur, vol.22, issue.1, pp.1-7, 2019.

M. Ohkubo, K. Suzuki, and S. Kinoshita, Cryptographic approach to "privacy-friendly" tags, RFID privacy workshop, vol.82, 2003.

J. Schwartz, Researchers see privacy pitfalls in no-swipe credit cards, New York Times

D. Strobel, Chair for Communication Security, Ruhr-Universität Bochum, vol.14, 2007.

T. Van-deursen, S. Mauw, and S. Radomirovic, Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, Information Security Theory and Practices, vol.5019, pp.1-15, 2008.

T. Van-deursen and S. Radomirovic, Attacks on RFID protocols, IACR Cryptology ePrint Archive, p.310, 2008.

S. Vaudenay, On privacy models for RFID, 13th International Conference on the Theory and Application of Cryptology and Information Security, vol.4833, pp.68-87, 2007.