@article(AbadiC06, author = {Mart{\'{\i}}n Abadi and V{\'{e}}ronique Cortier}, year = {2006}, title = {Deciding knowledge in security protocols under equational theories}, journal = {Theor. Comput. Sci.}, volume = {367}, number = {1-2}, pages = {2--32}, doi = {10.1016/j.tcs.2006.08.032}, ) @inproceedings(ArsacBCC09, author = {Wihem Arsac and Giampaolo Bella and Xavier Chantry and Luca Compagna}, year = {2009}, title = {Validating Security Protocols under the General Attacker}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, booktitle = {Foundations and Applications of Security Analysis, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, publisher = {Springer}, pages = {34--51}, doi = {10.1007/978-3-642-03459-6\_3}, ) @inproceedings(BellaBM03, author = {Giampaolo Bella and Stefano Bistarelli and Fabio Massacci}, year = {2003}, title = {A Protocol's Life After Attacks...}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, publisher = {Springer}, pages = {3--10}, doi = {10.1007/11542322\_2}, ) @article(IPL10, author = {Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, year = {2010}, title = {Compiling and securing cryptographic protocols}, journal = {Inf. Proc. Lett.}, volume = {110}, number = {3}, pages = {116--122}, doi = {10.1016/j.ipl.2009.11.004}, ) @inproceedings(robin:csf17, author = {St{\'{e}}phanie Delaune and Steve Kremer and Ludovic Robin}, year = {2017}, title = {Formal Verification of Protocols Based on Short Authenticated Strings}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {130--143}, doi = {10.1109/CSF.2017.26}, ) @incollection(DBLP:books/el/RV01/DershowitzP01, author = {Nachum Dershowitz and David A. Plaisted}, year = {2001}, title = {Rewriting}, booktitle = {Handbook of Automated Reasoning}, publisher = {Elsevier and {MIT} Press}, pages = {535--610}, doi = {10.1016/B978-044450813-3/50011-4}, ) @article(FiazzaPV15, author = {Maria{-}Camilla Fiazza and Michele Peroli and Luca Vigan{\`{o}}}, year = {2015}, title = {Defending Vulnerable Security Protocols by Means of Attack Interference in Non-Collaborative Scenarios}, journal = {Front. {ICT}}, volume = {2015}, doi = {10.3389/fict.2015.00011}, ) @inproceedings(Lowe99, author = {Mei Lin Hui and Gavin Lowe}, year = {1999}, title = {Safe Simplifying Transformations for Security Protocols}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, publisher = {{IEEE} Computer Society}, pages = {32--43}, doi = {10.1109/CSFW.1999.779760}, ) @inproceedings(ASIACCS, author = {Zhiwei Li and Weichao Wang}, year = {2012}, title = {Towards the attacker's view of protocol narrations (or, how to compile security protocols)}, editor = {Heung Youl Youm and Yoojae Won}, booktitle = {7th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, publisher = {{ACM}}, pages = {44--45}, doi = {10.1145/2414456.2414481}, ) @article(lowe-nspk, author = {Gavin Lowe}, year = {1996}, title = {Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using {FDR}}, journal = {Software - Concepts and Tools}, volume = {17}, number = {3}, pages = {93--102}, doi = {10.1007/3-540-61042-1_43}, ) @article(NS78, author = {Roger M. Needham and Michael D. Schroeder}, year = {1978}, title = {Using Encryption for Authentication in Large Networks of Computers}, journal = {Commun. {ACM}}, volume = {21}, number = {12}, pages = {993--999}, doi = {10.1145/359340.359342}, ) @phdthesis(these-robin, author = {Ludovic Robin}, year = {2018}, title = {V{\'{e}}rification formelle de protocoles bas{\'{e}}s sur de courtes chaines authentifi{\'{e}}es. (Formal verification of protocols based on short authenticated strings)}, school = {University of Lorraine, Nancy, France}, url = {https://tel.archives-ouvertes.fr/tel-01767989}, ) @inproceedings(machiavelli, author = {Paul F. Syverson and Catherine A. Meadows}, year = {2000}, title = {Dolev-Yao is no better than Machiavelli}, booktitle = {Proceedings of the first {\em Workshop on Issues in the Theory of Security (WITS'00)}}, doi = {10.21236/ADA464936}, ) @inproceedings(strand, author = {F. Javier Thayer and Jonathan C. Herzog and Joshua D. Guttman}, year = {1998}, title = {Strand Spaces: Why is a Security Protocol Correct?}, booktitle = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, May 3-6, 1998, Proceedings}, publisher = {{IEEE} Computer Society}, pages = {160--171}, doi = {10.1109/SECPRI.1998.674832}, )