H. Comon-lundh and V. Cortier, How to prove security of communication protocols? a discussion on the soundness of formal models w.r.t. computational ones, STACS, pp.29-44, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00573590

M. Rusinowith and M. Turuani, Protocol insecurity with finite number of sessions is np-complete, 14th Computer Security Foundations Workshop (CSFW). IEEE, pp.174-190, 2001.

A. Armando, The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proceedings of Computer Aided Verification (CAV), ser, pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

A. Armando, R. Carbone, and L. Compagna, Ltl model checking for security protocols Applied Non-Classical Logics, 2009.
DOI : 10.1109/csf.2007.24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Barnat, Distributed memory LTL model checking, 2004.
DOI : 10.1007/3-540-45139-0_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Schwoon and J. Esparza, A Note on On-the-Fly Verification Algorithms, TACAS, ser, pp.174-190, 2005.
DOI : 10.1007/978-3-540-31980-1_12

J. H. Reif, Depth-first search is inherently sequential, Information Processing Letters, vol.20, issue.5, pp.229-234, 1985.
DOI : 10.1016/0020-0190(85)90024-9

R. H. Bisseling, Parallel Scientific Computation. A structured approach using BSP and MPI, 2004.
DOI : 10.1093/acprof:oso/9780198529392.001.0001

G. Bhat, R. Cleaveland, and O. Grumberg, Efficient onthe-fly model checking for ctl*, Proceedings of the 10th Annual IEEE Symposium on Logic in Computer Science (LICS), pp.388-398, 1995.

F. Gava, M. Guedj, and F. Pommereau, A bsp algorithm for the state space construction of security protocols, " in PDMC, IEEE Computer Society, pp.37-44, 2010.

D. Dolev and A. C. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.
DOI : 10.1109/TIT.1983.1056650

F. Pommereau, Algebras of coloured Petri nets, 2010.

S. Christensen, L. M. Kristensen, and T. Mailund, A sweepline method for state space exploration, Proceedings of Tools and Algorithms for the Construction and Analysis of Systems (TACAS), ser, pp.450-464, 2001.

M. T. Dashti, A. Wijs, and B. Lisser, Distributed partial order reduction for security protocols, ENTCS, vol.198, pp.93-99, 2008.

R. Corin, Analysis models for security protocols, 2006.

F. Pommereau, Quickly prototyping Petri nets tools with SNAKES, Proceedings of the First International ICST Conference on Simulation Tools and Techniques for Communications Networks and Systems, pp.1-10, 2008.
DOI : 10.4108/ICST.SIMUTOOLS2008.3007

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

K. Hinsen, Parallel Scripting with Python, Computing in Science & Engineering, vol.9, issue.6, 2007.
DOI : 10.1109/MCSE.2007.117

URL : https://hal.archives-ouvertes.fr/hal-00282403

L. and E. Cachan, SPORE: Security protocols open repository

C. J. Cremers, Scyther -semantics and verification of security protocols, 2006.

N. Dalal, J. Shah, K. Hisaria, and D. Jinwala, A Comparative Analysis of Tools for Verification of Security Protocols, International Journal of Communications, Network and System Sciences, vol.03, issue.10, pp.779-787, 2010.
DOI : 10.4236/ijcns.2010.310104

U. Stern and D. L. Dill, Parallelizing the Mur?? verifier, Proceedings of Computer Aided Verification (CAV), ser. LNCS, O. Grumberg, pp.256-267, 1997.
DOI : 10.1007/3-540-63166-6_26

H. Gao, L. Fronc, and F. Pommereau, Analysis of security protocols by annotations Optimising the compilation of petri net models, SUMO'11, 2008.

H. Garavel, R. Mateescu, and I. Smarandache, Parallel state space construction for model-checking, Workshop on Model Checking of Software SPIN, 2001.
DOI : 10.1007/3-540-45139-0_14

URL : https://hal.archives-ouvertes.fr/inria-00072247

C. Pajault, Model checkingparalì ele et réparti de réseaux de Petri colorés de haut-niveau, Conservatoire National des Arts et Métiers, 2008.

D. Petcu, Parallel explicit state reachability analysis and state space construction, Second International Symposium on Parallel and Distributed Computing, 2003. Proceedings., pp.207-214, 2003.
DOI : 10.1109/ISPDC.2003.1267665

A. Lluch-lafuente, implified distributed model checking by localizing cycles, 2002.

J. Barnat, L. Brim, and I. Cëerná, Property driven distribution of nested dfs, Workshop on Verification and Computational Logic UK, pp.1-10, 2002.

J. Barnat, J. Chaloupka, and J. V. , Distributed Algorithms for SCC Decomposition, Journal of Logic and Computation, vol.21, issue.1, pp.23-44, 2011.
DOI : 10.1093/logcom/exp003

P. Gastin and D. Oddoux, LTL with past and two-way veryweak alternating automata, 28th International Symposium on Mathematical Foundations of Computer Science (MFCS), ser. LNCS, 2003.

J. Barnat, L. Brim, M. Cerná, and P. Ro?kai, DiVinE: Parallel Distributed Model Checker (Tool paper), " in Parallel and Distributed Methods in Verification and High Performance Computational Systems Biology, pp.4-7, 2010.

J. Fortin and F. Gava, BSP-WHY, Proceedings of the fourth international workshop on High-level parallel programming and applications, HLPP '10, 2010.
DOI : 10.1145/1863482.1863491

URL : https://hal.archives-ouvertes.fr/tel-00974977

S. Sanjabi and F. Pommereau, Modelling, verification, and formal analysis of security properties in a P2P system, 2010 International Symposium on Collaborative Technologies and Systems, pp.543-548, 2010.
DOI : 10.1109/CTS.2010.5478474

S. Chaou, G. Utard, and F. Pommereau, Evaluating a peerto-peer storage system in presence of malicious peers, SPCLOUD-11, 2011.