1. An efficient cryptographic protocol verifier based on Prolog rules;Blanchet,2001
2. Thom W. Frühwirth, Ehud Y. Shapiro, Moshe Y. Vardi, Eyal Yardeni, Logic programs as types for logic programs, in: Proceedings of the Sixth Annual IEEE Symposium on Logic in Computer Science (LICS), 15–18 July, 1991, Amsterdam, The Netherlands, 1991, pp. 300–309.
3. Deciding H1 by resolution;Goubault-Larrecq;Information Processing Letters,2005
4. Cryptographic protocol analysis on real C code;Goubault-Larrecq,2005
5. Nevin Heintze, Set-based analysis of ML programs, in: Proceedings of the 1994 ACM Conference on LISP and Functional Programming, Orlando, Florida, USA, 1994, pp. 306–317.