H. Comon-lundh and V. Cortier, How to prove security of communication protocols? a discussion on the soundness of formal models w.r.t. computational ones, STACS, pp.29-44, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00573590

A. Armando, R. Carbone, and L. Compagna, LTL model checking for security protocols Applied Non-Classical Logics, 2009.

H. Garavel, R. Mateescu, and I. Smarandache, Parallel state space construction for model-checking, Workshop on Model Checking of Software SPIN, 2001.
DOI : 10.1007/3-540-45139-0_14

URL : https://hal.archives-ouvertes.fr/inria-00072247

J. H. Reif, Depth-first search is inherently sequential, Information Processing Letters, vol.20, issue.5, pp.229-234, 1985.
DOI : 10.1016/0020-0190(85)90024-9

R. H. Bisseling, Parallel Scientific Computation. A structured approach using BSP and MPI, 2004.

G. Bhat, R. Cleaveland, and O. Grumberg, Efficient on-thefly model checking for CTL*, Logic in Computer Science (LICS), pp.388-398, 1995.

F. Gava, M. Guedj, and F. Pommereau, A BSP algorithm for the state space construction of security protocols, " in PDMC, IEEE Computer Society, pp.37-44, 2010.

D. Dolev and A. C. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.
DOI : 10.1109/TIT.1983.1056650

F. Pommereau, Algebras of coloured Petri nets, 2010.

M. T. Dashti, A. Wijs, and B. Lisser, Distributed partial order reduction for security protocols, ENTCS, vol.198, pp.93-99, 2008.

M. Guedj, Bsp algorithms for LTL & CTL* model checking of security protocols, 2012.

F. Gava, M. Guedj, and F. Pommereau, A BSP Algorithm for On-the-fly Checking LTL Formulas on Security Protocols, 2012 11th International Symposium on Parallel and Distributed Computing, 2012.
DOI : 10.1109/ISPDC.2012.10

URL : https://hal.archives-ouvertes.fr/hal-00868689

N. Dalal, J. Shah, K. Hisaria, and D. Jinwala, A Comparative Analysis of Tools for Verification of Security Protocols, International Journal of Communications, Network and System Sciences, vol.03, issue.10, pp.779-787, 2010.
DOI : 10.4236/ijcns.2010.310104

J. Barnat, Distributed memory LTL model checking, 2004.
DOI : 10.1007/3-540-45139-0_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.2064

J. Barnat, L. Brim, and I. Cëerná, Property driven distribution of nested dfs, Workshop on Verification and Computational Logic (VCL), pp.1-10, 2002.

C. P. Inggs and H. Barringer, CTL* model checking on a shared-memory architecture, Formal Methods in System Design, pp.135-155, 2006.

A. Armando, The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification (CAV), ser. LNCS, pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

J. Barnat, L. Brim, M. Cerná, and P. Ro?kai, DiVinE: Parallel Distributed Model Checker, 2010 Ninth International Workshop on Parallel and Distributed Methods in Verification, and Second International Workshop on High Performance Computational Systems Biology, pp.4-7, 2010.
DOI : 10.1109/PDMC-HiBi.2010.9

S. Sanjabi and F. Pommereau, Modelling, verification, and formal analysis of security properties in a P2P system, 2010 International Symposium on Collaborative Technologies and Systems, pp.543-548, 2010.
DOI : 10.1109/CTS.2010.5478474