Cédric Fournet
Cédric Fournet
Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Mobile values, new names, and secure communication
M Abadi, C Fournet
Acm Sigplan Notices 36 (3), 104-115, 2001
11612001
The reflexive CHAM and the join-calculus
C Fournet, G Gonthier
Proceedings of the 23rd ACM SIGPLAN-SIGACT symposium on Principles of …, 1996
8381996
A calculus of mobile agents
C Fournet, G Gonthier, JJ Lévy, L Maranget, D Rémy
International Conference on Concurrency Theory, 406-421, 1996
6101996
VC3: Trustworthy data analytics in the cloud using SGX
F Schuster, M Costa, C Fournet, C Gkantsidis, M Peinado, G Mainar-Ruiz, ...
2015 IEEE Symposium on Security and Privacy, 38-54, 2015
5512015
Automated verification of selected equivalences for security protocols
B Blanchet, M Abadi, C Fournet
The Journal of Logic and Algebraic Programming 75 (1), 3-51, 2008
4532008
SecPAL: Design and semantics of a decentralized authorization language
MY Becker, C Fournet, AD Gordon
Journal of Computer Security 18 (4), 619-665, 2010
4372010
SecPAL: Design and semantics of a decentralized authorization language
MY Becker, C Fournet, AD Gordon
Journal of Computer Security 18 (4), 619-665, 2010
4372010
SecPAL: Design and semantics of a decentralized authorization language
MY Becker, C Fournet, AD Gordon
Journal of Computer Security 18 (4), 619-665, 2010
4372010
Formal verification of smart contracts: Short paper
K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ...
Proceedings of the 2016 ACM workshop on programming languages and analysis …, 2016
4282016
Oblivious multi-party machine learning on trusted processors
O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 619-636, 2016
3402016
A messy state of the union: Taming the composite state machines of TLS
B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ...
2015 IEEE Symposium on Security and Privacy, 535-552, 2015
2792015
Refinement types for secure implementations
J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 1-45, 2011
2792011
Access Control Based on Execution History.
M Abadi, C Fournet
NDSS 3, 107-121, 2003
2692003
Modern concurrency abstractions for C#
N Benton, L Cardelli, C Fournet
ACM Transactions on Programming Languages and Systems (TOPLAS) 26 (5), 769-804, 2004
2562004
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016
2392016
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
ACM SIGPLAN Notices 46 (9), 266-278, 2011
2382011
The join calculus: A language for distributed mobile programming
C Fournet, G Gonthier
International Summer School on Applied Semantics, 268-332, 2000
2312000
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub
2014 IEEE Symposium on Security and Privacy, 98-113, 2014
2202014
Implementing TLS with verified cryptographic security
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub
2013 IEEE Symposium on Security and Privacy, 445-459, 2013
2012013
Verified interoperable implementations of security protocols
K Bhargavan, C Fournet, AD Gordon, S Tse
ACM Transactions on Programming Languages and Systems (TOPLAS) 31 (1), 1-61, 2008
2012008
The system can't perform the operation now. Try again later.
Articles 1–20