default search action
Cédric Fournet
Person information
- affiliation: Microsoft Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich:
Why Should I Trust Your Code? Commun. ACM 67(1): 68-76 (2024) - 2023
- [j28]Heidi Howard, Fritz Alder, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Antoine Delignat-Lavaud, Cédric Fournet, Andrew Jeffery, Matthew Kerner, Fotios Kounelis, Markus A. Kuppe, Julien Maffre, Mark Russinovich, Christoph M. Wintersteiger:
Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability. Proc. VLDB Endow. 17(2): 225-240 (2023) - [j27]Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich:
Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy. ACM Queue 21(4): 94-122 (2023) - [c91]Haobin Ni, Antoine Delignat-Lavaud, Cédric Fournet, Tahina Ramananandro, Nikhil Swamy:
ASN1*: Provably Correct, Non-malleable Parsing for ASN.1 DER. CPP 2023: 275-289 - [c90]Kapil Vaswani, Stavros Volos, Cédric Fournet, Antonio Nino Diaz, Ken Gordon, Balaji Vembu, Sam Webster, David Chisnall, Saurabh Kulkarni, Graham Cunningham, Richard Osborne, Dan Wilkinson:
Confidential Computing within an AI Accelerator. USENIX ATC 2023: 501-518 - [c89]Jana Hofmann, Emanuele Vannacci, Cédric Fournet, Boris Köpf, Oleksii Oleksenko:
Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions. USENIX Security Symposium 2023: 7143-7160 - [i18]Heidi Howard, Fritz Alder, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Antoine Delignat-Lavaud, Cédric Fournet, Andrew Jeffery, Matthew Kerner, Fotios Kounelis, Markus A. Kuppe, Julien Maffre, Mark Russinovich, Christoph M. Wintersteiger:
Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability. CoRR abs/2310.11559 (2023) - 2022
- [c88]Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss:
Key-Schedule Security for the TLS 1.3 Standard. ASIACRYPT (1) 2022: 621-650 - [c87]Alex Shamis, Peter R. Pietzuch, Burcu Canakci, Miguel Castro, Cédric Fournet, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Antoine Delignat-Lavaud, Matthew Kerner, Julien Maffre, Olga Vrousgou, Christoph M. Wintersteiger, Manuel Costa, Mark Russinovich:
IA-CCF: Individual Accountability for Permissioned Ledgers. NSDI 2022: 467-491 - [i17]Kapil Vaswani, Stavros Volos, Cédric Fournet, Antonio Nino Diaz, Ken Gordon, Balaji Vembu, Sam Webster, David Chisnall, Saurabh Kulkarni, Graham Cunningham, Richard Osborne, Dan Wilkinson:
Confidential Machine Learning within Graphcore IPUs. CoRR abs/2205.09005 (2022) - 2021
- [j26]Mark Russinovich, Manuel Costa, Cédric Fournet, David Chisnall, Antoine Delignat-Lavaud, Sylvan Clebsch, Kapil Vaswani, Vikas Bhatia:
Toward confidential cloud computing. Commun. ACM 64(6): 54-61 (2021) - [j25]Mark Russinovich, Manuel Costa, Cédric Fournet, David Chisnall, Antoine Delignat-Lavaud, Sylvan Clebsch, Kapil Vaswani, Vikas Bhatia:
Toward Confidential Cloud Computing: Extending hardware-enforced cryptographic protection to data while in use. ACM Queue 19(1): 49-76 (2021) - [c86]Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, Cédric Fournet, Rebecca Burke-Aguero, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, John Deutscher, Shabnam Erfani, Matt Gaylor, Andrew Jenks, Kevin Kane, Elissa M. Redmiles, Alex Shamis, Isha Sharma, John C. Simmons, Sam Wenker, Anika Zaman:
AMP: authentication of media via provenance. MMSys 2021: 108-121 - [c85]Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou:
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer. SP 2021: 1162-1178 - [i16]Alex Shamis, Peter R. Pietzuch, Miguel Castro, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Antoine Delignat-Lavaud, Cédric Fournet, Matthew Kerner, Julien Maffre, Manuel Costa, Mark Russinovich:
PAC: Practical Accountability for CCF. CoRR abs/2105.13116 (2021) - [i15]Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss:
Key-schedule Security for the TLS 1.3 Standard. IACR Cryptol. ePrint Arch. 2021: 467 (2021) - 2020
- [c84]Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cédric Fournet, Natalia Kulatova, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph M. Wintersteiger, Santiago Zanella Béguelin:
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider. SP 2020: 983-1002 - [i14]Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, Cédric Fournet, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Shabnam Erfani, Kevin Kane, Alex Shamis:
AMP: Authentication of Media via Provenance. CoRR abs/2001.07886 (2020) - [i13]Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou:
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer. IACR Cryptol. ePrint Arch. 2020: 114 (2020)
2010 – 2019
- 2019
- [c83]Tahina Ramananandro, Antoine Delignat-Lavaud, Cédric Fournet, Nikhil Swamy, Tej Chajed, Nadim Kobeissi, Jonathan Protzenko:
EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats. USENIX Security Symposium 2019: 1465-1482 - [i12]Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cédric Fournet, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph M. Wintersteiger, Santiago Zanella Béguelin:
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider. IACR Cryptol. ePrint Arch. 2019: 757 (2019) - 2018
- [j24]Martín Abadi, Bruno Blanchet, Cédric Fournet:
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication. J. ACM 65(1): 1:1-1:41 (2018) - [j23]Danel Ahman, Cédric Fournet, Catalin Hritcu, Kenji Maillard, Aseem Rastogi, Nikhil Swamy:
Recalling a witness: foundations and applications of monotonic state. Proc. ACM Program. Lang. 2(POPL): 65:1-65:30 (2018) - [c82]Chris Brzuska, Antoine Delignat-Lavaud, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss:
State Separation for Code-Based Game-Playing Proofs. ASIACRYPT (3) 2018: 222-249 - [c81]Niklas Grimm, Kenji Maillard, Cédric Fournet, Catalin Hritcu, Matteo Maffei, Jonathan Protzenko, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin:
A monadic framework for relational verification: applied to information security, program equivalence, and optimizations. CPP 2018: 130-145 - 2017
- [j22]Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue:
A messy state of the union: taming the composite state machines of TLS. Commun. ACM 60(2): 99-107 (2017) - [j21]Jonathan Protzenko, Jean Karim Zinzindohoué, Aseem Rastogi, Tahina Ramananandro, Peng Wang, Santiago Zanella Béguelin, Antoine Delignat-Lavaud, Catalin Hritcu, Karthikeyan Bhargavan, Cédric Fournet, Nikhil Swamy:
Verified low-level programming embedded in F. Proc. ACM Program. Lang. 1(ICFP): 17:1-17:29 (2017) - [c80]Karthikeyan Bhargavan, Barry Bond, Antoine Delignat-Lavaud, Cédric Fournet, Chris Hawblitzel, Catalin Hritcu, Samin Ishtiaq, Markulf Kohlweiss, K. Rustan M. Leino, Jay R. Lorch, Kenji Maillard, Jianyang Pan, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Ashay Rane, Aseem Rastogi, Nikhil Swamy, Laure Thompson, Peng Wang, Santiago Zanella Béguelin, Jean Karim Zinzindohoue:
Everest: Towards a Verified, Drop-in Replacement of HTTPS. SNAPL 2017: 1:1-1:12 - [c79]Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin, Karthikeyan Bhargavan, Jianyang Pan, Jean Karim Zinzindohoue:
Implementing and Proving the TLS 1.3 Record Layer. IEEE Symposium on Security and Privacy 2017: 463-482 - [i11]Jonathan Protzenko, Jean Karim Zinzindohoué, Aseem Rastogi, Tahina Ramananandro, Peng Wang, Santiago Zanella Béguelin, Antoine Delignat-Lavaud, Catalin Hritcu, Karthikeyan Bhargavan, Cédric Fournet, Nikhil Swamy:
Verified Low-Level Programming Embedded in F*. CoRR abs/1703.00053 (2017) - [i10]Niklas Grimm, Kenji Maillard, Cédric Fournet, Catalin Hritcu, Matteo Maffei, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin:
A Monadic Framework for Relational Verification (Functional Pearl). CoRR abs/1703.00055 (2017) - [i9]Danel Ahman, Cédric Fournet, Catalin Hritcu, Kenji Maillard, Aseem Rastogi, Nikhil Swamy:
Recalling a Witness: Foundations and Applications of Monotonic State. CoRR abs/1707.02466 (2017) - 2016
- [j20]Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss:
miTLS: Verifying Protocol Implementations against Real-World Attacks. IEEE Secur. Priv. 14(6): 18-25 (2016) - [c78]Cédric Fournet:
Verified Secure Implementations for the HTTPS Ecosystem: Invited Talk. PLAS@CCS 2016: 89 - [c77]Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Anitha Gollamudi, Georges Gonthier, Nadim Kobeissi, Natalia Kulatova, Aseem Rastogi, Thomas Sibut-Pinote, Nikhil Swamy, Santiago Zanella Béguelin:
Formal Verification of Smart Contracts: Short Paper. PLAS@CCS 2016: 91-96 - [c76]Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno:
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data. CCS 2016: 1304-1316 - [c75]Cédric Fournet, Chantal Keller, Vincent Laporte:
A Certified Compiler for Verifiable Computing. CSF 2016: 268-280 - [c74]Nikhil Swamy, Catalin Hritcu, Chantal Keller, Aseem Rastogi, Antoine Delignat-Lavaud, Simon Forest, Karthikeyan Bhargavan, Cédric Fournet, Pierre-Yves Strub, Markulf Kohlweiss, Jean Karim Zinzindohoue, Santiago Zanella Béguelin:
Dependent types and multi-monadic effects in F. POPL 2016: 256-270 - [c73]Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Bryan Parno:
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation. IEEE Symposium on Security and Privacy 2016: 235-254 - [c72]Karthikeyan Bhargavan, Christina Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella Béguelin:
Downgrade Resilience in Key-Exchange Protocols. IEEE Symposium on Security and Privacy 2016: 506-525 - [c71]Olga Ohrimenko, Felix Schuster, Cédric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, Manuel Costa:
Oblivious Multi-Party Machine Learning on Trusted Processors. USENIX Security Symposium 2016: 619-636 - [i8]Martín Abadi, Bruno Blanchet, Cédric Fournet:
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication. CoRR abs/1609.03003 (2016) - [i7]Karthikeyan Bhargavan, Christina Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella Béguelin:
Downgrade Resilience in Key-Exchange Protocols. IACR Cryptol. ePrint Arch. 2016: 72 (2016) - [i6]Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno:
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data. IACR Cryptol. ePrint Arch. 2016: 985 (2016) - [i5]Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jianyang Pan, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin, Jean Karim Zinzindohoue:
Implementing and Proving the TLS 1.3 Record Layer. IACR Cryptol. ePrint Arch. 2016: 1178 (2016) - 2015
- [c70]Olga Ohrimenko, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Markulf Kohlweiss, Divya Sharma:
Observing and Preventing Leakage in MapReduce. CCS 2015: 1570-1581 - [c69]Aseem Rastogi, Nikhil Swamy, Cédric Fournet, Gavin M. Bierman, Panagiotis Vekris:
Safe & Efficient Gradual Typing for TypeScript. POPL 2015: 167-180 - [c68]Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich:
VC3: Trustworthy Data Analytics in the Cloud Using SGX. IEEE Symposium on Security and Privacy 2015: 38-54 - [c67]Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur:
Geppetto: Versatile Verifiable Computation. IEEE Symposium on Security and Privacy 2015: 253-270 - [c66]Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue:
A Messy State of the Union: Taming the Composite State Machines of TLS. IEEE Symposium on Security and Privacy 2015: 535-552 - [e2]Cédric Fournet, Michael W. Hicks, Luca Viganò:
IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7538-2 [contents] - 2014
- [c65]George Danezis, Cédric Fournet, Jens Groth, Markulf Kohlweiss:
Square Span Programs with Applications to Succinct NIZK Arguments. ASIACRYPT (1) 2014: 532-550 - [c64]Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Santiago Zanella Béguelin:
Proving the TLS Handshake Secure (As It Is). CRYPTO (2) 2014: 235-255 - [c63]Gilles Barthe, Cédric Fournet, Benjamin Grégoire, Pierre-Yves Strub, Nikhil Swamy, Santiago Zanella Béguelin:
Probabilistic relational verification for cryptographic implementations. POPL 2014: 193-206 - [c62]Nikhil Swamy, Cédric Fournet, Aseem Rastogi, Karthikeyan Bhargavan, Juan Chen, Pierre-Yves Strub, Gavin M. Bierman:
Gradual typing embedded securely in JavaScript. POPL 2014: 425-438 - [c61]Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Alfredo Pironti, Pierre-Yves Strub:
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS. IEEE Symposium on Security and Privacy 2014: 98-113 - [i4]Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Santiago Zanella Béguelin:
Proving the TLS Handshake Secure (as it is). IACR Cryptol. ePrint Arch. 2014: 182 (2014) - [i3]George Danezis, Cédric Fournet, Jens Groth, Markulf Kohlweiss:
Square Span Programs with Applications to Succinct NIZK Arguments. IACR Cryptol. ePrint Arch. 2014: 718 (2014) - [i2]Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur:
Geppetto: Versatile Verifiable Computation. IACR Cryptol. ePrint Arch. 2014: 976 (2014) - 2013
- [j19]Nikhil Swamy, Juan Chen, Cédric Fournet, Pierre-Yves Strub, Karthikeyan Bhargavan, Jean Yang:
Secure distributed programming with value-dependent types. J. Funct. Program. 23(4): 402-451 (2013) - [c60]George Danezis, Cédric Fournet, Markulf Kohlweiss, Bryan Parno:
Pinocchio coin: building zerocoin from a succinct pairing-based proof system. PETShop@CCS 2013: 27-30 - [c59]George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella Béguelin:
Smart meter aggregation via secret-sharing. SEGS@CCS 2013: 75-80 - [c58]Cédric Fournet, Nikhil Swamy, Juan Chen, Pierre-Évariste Dagand, Pierre-Yves Strub, Benjamin Livshits:
Fully abstract compilation to JavaScript. POPL 2013: 371-384 - [c57]Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub:
Implementing TLS with Verified Cryptographic Security. IEEE Symposium on Security and Privacy 2013: 445-459 - [c56]Cédric Fournet, Markulf Kohlweiss, George Danezis, Zhengqin Luo:
ZQL: A Compiler for Privacy-Preserving Data Processing. USENIX Security Symposium 2013: 163-178 - 2012
- [j18]Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu:
Verified Cryptographic Implementations for TLS. ACM Trans. Inf. Syst. Secur. 15(1): 3:1-3:32 (2012) - [c55]Pierre-Yves Strub, Nikhil Swamy, Cédric Fournet, Juan Chen:
Self-certification: bootstrapping certified typecheckers in F* with Coq. POPL 2012: 571-584 - 2011
- [j17]Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Sergio Maffeis:
Refinement types for secure implementations. ACM Trans. Program. Lang. Syst. 33(2): 8:1-8:45 (2011) - [c54]Cédric Fournet, Markulf Kohlweiss, Pierre-Yves Strub:
Modular code-based cryptographic verification. CCS 2011: 341-350 - [c53]Cédric Fournet, Jérémy Planul, Tamara Rezk:
Information-flow types for homomorphic encryptions. CCS 2011: 351-360 - [c52]Cédric Fournet, Jérémy Planul:
Compiling Information-Flow Security to Minimal Trusted Computing Bases. ESOP 2011: 216-235 - [c51]Cédric Fournet, Karthikeyan Bhargavan, Andrew D. Gordon:
Cryptographic Verification by Typing for a Sample Protocol Implementation. FOSAD 2011: 66-100 - [c50]Nikhil Swamy, Juan Chen, Cédric Fournet, Pierre-Yves Strub, Karthikeyan Bhargavan, Jean Yang:
Secure distributed programming with value-dependent types. ICFP 2011: 266-278 - 2010
- [j16]Moritz Y. Becker, Cédric Fournet, Andrew D. Gordon:
SecPAL: Design and semantics of a decentralized authorization language. J. Comput. Secur. 18(4): 619-665 (2010) - [c49]Karthikeyan Bhargavan, Cédric Fournet, Nataliya Guts:
Typechecking Higher-Order Security Libraries. APLAS 2010: 47-62 - [c48]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
Modular verification of security protocol code by typing. POPL 2010: 445-456 - [p1]Andrew D. Gordon, Cédric Fournet:
Principles and Applications of Refinement Types. Logics and Languages for Reliability and Security 2010: 73-104
2000 – 2009
- 2009
- [c47]Cédric Fournet, Gurvan Le Guernic, Tamara Rezk:
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms. CCS 2009: 432-441 - [c46]Jérémy Planul, Ricardo Corin, Cédric Fournet:
Secure Enforcement for Global Process Specifications. CONCUR 2009: 511-526 - [c45]Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, James J. Leifer:
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions. CSF 2009: 124-140 - [c44]Nataliya Guts, Cédric Fournet, Francesco Zappa Nardelli:
Reliable Evidence: Auditability by Typing. ESORICS 2009: 168-183 - 2008
- [j15]Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer:
A secure compiler for session abstractions. J. Comput. Secur. 16(5): 573-636 (2008) - [j14]Bruno Blanchet, Martín Abadi, Cédric Fournet:
Automated verification of selected equivalences for security protocols. J. Log. Algebraic Methods Program. 75(1): 3-51 (2008) - [j13]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
Verifying policy-based web services security. ACM Trans. Program. Lang. Syst. 30(6): 30:1-30:59 (2008) - [j12]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse:
Verified interoperable implementations of security protocols. ACM Trans. Program. Lang. Syst. 31(1): 5:1-5:61 (2008) - [c43]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Nikhil Swamy:
Verified implementations of the information card federated identity-management protocol. AsiaCCS 2008: 123-135 - [c42]Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu:
Cryptographically verified implementations for TLS. CCS 2008: 459-468 - [c41]Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Sergio Maffeis:
Refinement Types for Secure Implementations. CSF 2008: 17-32 - [c40]Cédric Fournet, Nataliya Guts, Francesco Zappa Nardelli:
A Formal Implementation of Value Commitment. ESOP 2008: 383-397 - [c39]Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon:
Code-Carrying Authorization. ESORICS 2008: 563-579 - [c38]Cédric Fournet, Tamara Rezk:
Cryptographically sound implementations for typed information-flow security. POPL 2008: 323-335 - [e1]Gilles Barthe, Cédric Fournet:
Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4912, Springer 2008, ISBN 978-3-540-78662-7 [contents] - 2007
- [j11]Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon:
Secure sessions for Web services. ACM Trans. Inf. Syst. Secur. 10(2): 8 (2007) - [j10]Martín Abadi, Bruno Blanchet, Cédric Fournet:
Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur. 10(3): 9 (2007) - [j9]Cédric Fournet, Andrew D. Gordon, Sergio Maffeis:
A type discipline for authorization policies. ACM Trans. Program. Lang. Syst. 29(5): 25 (2007) - [c37]Moritz Y. Becker, Cédric Fournet, Andrew D. Gordon:
Design and Semantics of a Decentralized Authorization Language. CSF 2007: 3-15 - [c36]Cédric Fournet, Andy Gordon, Sergio Maffeis:
A Type Discipline for Authorization in Distributed Systems. CSF 2007: 31-48 - [c35]Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer:
Secure Implementations for Typed Session Abstractions. CSF 2007: 170-186 - 2006
- [c34]Martín Abadi, Ricardo Corin, Cédric Fournet:
Computational Secrecy by Typing for the Pi Calculus. APLAS 2006: 253-269 - [c33]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse:
Verified Interoperable Implementations of Security Protocols. CSFW 2006: 139-152 - [c32]Pedro Adão, Cédric Fournet:
Cryptographically Sound Implementations for Communicating Processes. ICALP (2) 2006: 83-94 - [c31]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
Verified Reference Implementations of WS-Security Protocols. WS-FM 2006: 88-106 - 2005
- [j8]Cédric Fournet, Georges Gonthier:
A hierarchy of equivalences for asynchronous calculi. J. Log. Algebraic Methods Program. 63(1): 131-173 (2005) - [j7]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
A semantics for web services authentication. Theor. Comput. Sci. 340(1): 102-153 (2005) - [c30]Cédric Fournet, Andrew D. Gordon, Sergio Maffeis:
A Type Discipline for Authorization Policies. ESOP 2005: 141-156 - [c29]Bruno Blanchet, Martín Abadi, Cédric Fournet:
Automated Verification of Selected Equivalences for Security Protocols. LICS 2005: 331-340 - [c28]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Greg O'Shea:
An advisor for web services security policies. SWS 2005: 1-9 - 2004
- [j6]Martín Abadi, Cédric Fournet:
Private authentication. Theor. Comput. Sci. 322(3): 427-476 (2004) - [j5]Nick Benton, Luca Cardelli, Cédric Fournet:
Modern concurrency abstractions for C#. ACM Trans. Program. Lang. Syst. 26(5): 769-804 (2004) - [c27]Cédric Fournet, C. A. R. Hoare, Sriram K. Rajamani, Jakob Rehof:
Stuck-Free Conformance. CAV 2004: 242-254 - [c26]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
Verifying policy-based security for web services. CCS 2004: 268-277 - [c25]Frédéric Besson, Tomasz Blanc, Cédric Fournet, Andrew D. Gordon:
From Stack Inspection to Access Control: A Security Analysis for Libraries. CSFW 2004: 61- - [c24]Martín Abadi, Bruno Blanchet, Cédric Fournet:
Just Fast Keying in the Pi Calculus. ESOP 2004: 340-354 - [c23]Richard Black, Austin Donnelly, Cédric Fournet:
Ethernet Topology Discovery without Network Assistance. ICNP 2004: 328-339 - [c22]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
A semantics for web services authentication. POPL 2004: 198-209 - [c21]Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon:
Secure sessions for web services. SWS 2004: 56-66 - [i1]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella:
TulaFale: A Security Tool for Web Services. CoRR abs/cs/0412044 (2004) - 2003
- [j4]Cédric Fournet, Cosimo Laneve, Luc Maranget, Didier Rémy:
Inheritance in the join calculus. J. Log. Algebraic Methods Program. 57(1-2): 23-69 (2003) - [j3]Cédric Fournet, Andrew D. Gordon:
Stack inspection: Theory and variants. ACM Trans. Program. Lang. Syst. 25(3): 360-399 (2003) - [c20]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella:
TulaFale: A Security Tool for Web Services. FMCO 2003: 197-222 - [c19]Martín Abadi, Cédric Fournet:
Access Control Based on Execution History. NDSS 2003 - 2002
- [j2]Martín Abadi, Cédric Fournet, Georges Gonthier:
Secure Implementation of Channel Abstractions. Inf. Comput. 174(1): 37-83 (2002) - [c18]Cédric Fournet, Fabrice Le Fessant, Luc Maranget, Alan Schmitt:
JoCaml: A Language for Concurrent Distributed and Mobile Programming. Advanced Functional Programming 2002: 129-158 - [c17]Nick Benton, Luca Cardelli, Cédric Fournet:
Modern Concurrency Abstractions for C#. ECOOP 2002: 415-440 - [c16]Cédric Fournet, Martín Abadi:
Hiding Names: Private Authentication in the Applied Pi Calculus. ISSS 2002: 317-338 - [c15]Cédric Fournet, Andrew D. Gordon:
Stack inspection: theory and variants. POPL 2002: 307-318 - 2001
- [j1]Cédric Fournet, Cosimo Laneve:
Bisimulations in the join-calculus. Theor. Comput. Sci. 266(1-2): 569-603 (2001) - [c14]Martín Abadi, Cédric Fournet:
Mobile values, new names, and secure communication. POPL 2001: 104-115 - 2000
- [c13]Cédric Fournet, Georges Gonthier:
The Join Calculus: A Language for Distributed Mobile Programming. APPSEM 2000: 268-332 - [c12]Cédric Fournet, Cosimo Laneve, Luc Maranget, Didier Rémy:
Inheritance in the Join Calculus. FSTTCS 2000: 397-408 - [c11]Cédric Fournet, Jean-Jacques Lévy, Alan Schmitt:
An Asynchronous, Distributed Implementation of Mobile Ambients. IFIP TCS 2000: 348-364 - [c10]Martín Abadi, Cédric Fournet, Georges Gonthier:
Authentication Primitives and Their Compilation. POPL 2000: 302-315
1990 – 1999
- 1999
- [c9]Martín Abadi, Cédric Fournet, Georges Gonthier:
A Top-Down Look at a Secure Message. FSTTCS 1999: 122-141 - [c8]Martín Abadi, Cédric Fournet, Georges Gonthier:
Secure Communications Processing for Distributed Languages. S&P 1999: 74-88 - 1998
- [c7]Cédric Fournet, Georges Gonthier:
A Hierarchy of Equivalences for Asynchronous Calculi. ICALP 1998: 844-855 - [c6]Martín Abadi, Cédric Fournet, Georges Gonthier:
Secure Implementation of Channel Abstractions. LICS 1998: 105-116 - [c5]Michele Boreale, Cédric Fournet, Cosimo Laneve:
Bisimulations in the join-calculus. PROCOMET 1998: 68-86 - 1997
- [c4]Cédric Fournet, Cosimo Laneve, Luc Maranget, Didier Rémy:
Implicit Typing à la ML for the Join-Calculus. CONCUR 1997: 196-212 - [c3]Martín Abadi, Cédric Fournet, Georges Gonthier:
Secure Implementation of Channel Abstractions. HOOTS 1997: 202-203 - 1996
- [c2]Cédric Fournet, Georges Gonthier, Jean-Jacques Lévy, Luc Maranget, Didier Rémy:
A Calculus of Mobile Agents. CONCUR 1996: 406-421 - [c1]Cédric Fournet, Georges Gonthier:
The Reflexive CHAM and the Join-Calculus. POPL 1996: 372-385
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint