|
Search the dblp DataBase
Cédric Fournet:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Cédric Fournet, Georges Gonthier
The Join Calculus: A Language for Distributed Mobile Programming. [Citation Graph (0, 0)][DBLP] APPSEM, 2000, pp:268-332 [Conf]
- Cédric Fournet, Fabrice Le Fessant, Luc Maranget, Alan Schmitt
JoCaml: A Language for Concurrent Distributed and Mobile Programming. [Citation Graph (0, 0)][DBLP] Advanced Functional Programming, 2002, pp:129-158 [Conf]
- Martín Abadi, Ricardo Corin, Cédric Fournet
Computational Secrecy by Typing for the Pi Calculus. [Citation Graph (0, 0)][DBLP] APLAS, 2006, pp:253-269 [Conf]
- Cédric Fournet, C. A. R. Hoare, Sriram K. Rajamani, Jakob Rehof
Stuck-Free Conformance. [Citation Graph (0, 0)][DBLP] CAV, 2004, pp:242-254 [Conf]
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
Verifying policy-based security for web services. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:268-277 [Conf]
- Cédric Fournet, Georges Gonthier, Jean-Jacques Lévy, Luc Maranget, Didier Rémy
A Calculus of Mobile Agents. [Citation Graph (0, 0)][DBLP] CONCUR, 1996, pp:406-421 [Conf]
- Cédric Fournet, Cosimo Laneve, Luc Maranget, Didier Rémy
Implicit Typing à la ML for the Join-Calculus. [Citation Graph (0, 0)][DBLP] CONCUR, 1997, pp:196-212 [Conf]
- Frédéric Besson, Tomasz Blanc, Cédric Fournet, Andrew D. Gordon
From Stack Inspection to Access Control: A Security Analysis for Libraries. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:61-0 [Conf]
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse
Verified Interoperable Implementations of Security Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2006, pp:139-152 [Conf]
- Nick Benton, Luca Cardelli, Cédric Fournet
Modern Concurrency Abstractions for C#. [Citation Graph (0, 0)][DBLP] ECOOP, 2002, pp:415-440 [Conf]
- Martín Abadi, Bruno Blanchet, Cédric Fournet
Just Fast Keying in the Pi Calculus. [Citation Graph (0, 0)][DBLP] ESOP, 2004, pp:340-354 [Conf]
- Cédric Fournet, Andrew D. Gordon, Sergio Maffeis
A Type Discipline for Authorization Policies. [Citation Graph (0, 0)][DBLP] ESOP, 2005, pp:141-156 [Conf]
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella
TulaFale: A Security Tool for Web Services. [Citation Graph (0, 0)][DBLP] FMCO, 2003, pp:197-222 [Conf]
- Martín Abadi, Cédric Fournet, Georges Gonthier
A Top-Down Look at a Secure Message. [Citation Graph (0, 0)][DBLP] FSTTCS, 1999, pp:122-141 [Conf]
- Cédric Fournet, Cosimo Laneve, Luc Maranget, Didier Rémy
Inheritance in the Join Calculus. [Citation Graph (0, 0)][DBLP] FSTTCS, 2000, pp:397-408 [Conf]
- Pedro Adão, Cédric Fournet
Cryptographically Sound Implementations for Communicating Processes. [Citation Graph (0, 0)][DBLP] ICALP (2), 2006, pp:83-94 [Conf]
- Cédric Fournet, Georges Gonthier
A Hierarchy of Equivalences for Asynchronous Calculi. [Citation Graph (0, 0)][DBLP] ICALP, 1998, pp:844-855 [Conf]
- Richard Black, Austin Donnelly, Cédric Fournet
Ethernet Topology Discovery without Network Assistance. [Citation Graph (0, 0)][DBLP] ICNP, 2004, pp:328-339 [Conf]
- Cédric Fournet, Jean-Jacques Lévy, Alan Schmitt
An Asynchronous, Distributed Implementation of Mobile Ambients. [Citation Graph (0, 0)][DBLP] IFIP TCS, 2000, pp:348-364 [Conf]
- Cédric Fournet, Martín Abadi
Hiding Names: Private Authentication in the Applied Pi Calculus. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:317-338 [Conf]
- Martín Abadi, Cédric Fournet, Georges Gonthier
Secure Implementation of Channel Abstractions. [Citation Graph (0, 0)][DBLP] LICS, 1998, pp:105-116 [Conf]
- Bruno Blanchet, Martín Abadi, Cédric Fournet
Automated Verification of Selected Equivalences for Security Protocols. [Citation Graph (0, 0)][DBLP] LICS, 2005, pp:331-340 [Conf]
- Martín Abadi, Cédric Fournet
Access Control Based on Execution History. [Citation Graph (0, 0)][DBLP] NDSS, 2003, pp:- [Conf]
- Martín Abadi, Cédric Fournet
Mobile values, new names, and secure communication. [Citation Graph (0, 0)][DBLP] POPL, 2001, pp:104-115 [Conf]
- Martín Abadi, Cédric Fournet, Georges Gonthier
Authentication Primitives and Their Compilation. [Citation Graph (0, 0)][DBLP] POPL, 2000, pp:302-315 [Conf]
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
A semantics for web services authentication. [Citation Graph (0, 0)][DBLP] POPL, 2004, pp:198-209 [Conf]
- Cédric Fournet, Andrew D. Gordon
Stack inspection: theory and variants. [Citation Graph (0, 0)][DBLP] POPL, 2002, pp:307-318 [Conf]
- Cédric Fournet, Georges Gonthier
The Reflexive CHAM and the Join-Calculus. [Citation Graph (0, 0)][DBLP] POPL, 1996, pp:372-385 [Conf]
- Michele Boreale, Cédric Fournet, Cosimo Laneve
Bisimulations in the join-calculus. [Citation Graph (0, 0)][DBLP] PROCOMET, 1998, pp:68-86 [Conf]
- Martín Abadi, Cédric Fournet, Georges Gonthier
Secure Communications Processing for Distributed Languages. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1999, pp:74-88 [Conf]
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
Verified Reference Implementations of WS-Security Protocols. [Citation Graph (0, 0)][DBLP] WS-FM, 2006, pp:88-106 [Conf]
- Martín Abadi, Cédric Fournet, Georges Gonthier
Secure Implementation of Channel Abstractions. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 1997, v:10, n:, pp:- [Journal]
- Martín Abadi, Cédric Fournet, Georges Gonthier
Secure Implementation of Channel Abstractions. [Citation Graph (0, 0)][DBLP] Inf. Comput., 2002, v:174, n:1, pp:37-83 [Journal]
- Cédric Fournet, Georges Gonthier
A hierarchy of equivalences for asynchronous calculi. [Citation Graph (0, 0)][DBLP] J. Log. Algebr. Program., 2005, v:63, n:1, pp:131-173 [Journal]
- Cédric Fournet, Cosimo Laneve, Luc Maranget, Didier Rémy
Inheritance in the join calculus. [Citation Graph (0, 0)][DBLP] J. Log. Algebr. Program., 2003, v:57, n:1-2, pp:23-69 [Journal]
- Martín Abadi, Cédric Fournet
Private authentication. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2004, v:322, n:3, pp:427-476 [Journal]
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
A semantics for web services authentication. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2005, v:340, n:1, pp:102-153 [Journal]
- Cédric Fournet, Cosimo Laneve
Bisimulations in the join-calculus. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2001, v:266, n:1-2, pp:569-603 [Journal]
- Nick Benton, Luca Cardelli, Cédric Fournet
Modern concurrency abstractions for C#. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 2004, v:26, n:5, pp:769-804 [Journal]
- Cédric Fournet, Andrew D. Gordon
Stack inspection: Theory and variants. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 2003, v:25, n:3, pp:360-399 [Journal]
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella
TulaFale: A Security Tool for Web Services [Citation Graph (0, 0)][DBLP] CoRR, 2004, v:0, n:, pp:- [Journal]
- Martín Abadi, Bruno Blanchet, Cédric Fournet
Just fast keying in the pi calculus. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal]
- Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon
Secure sessions for Web services. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal]
- Cédric Fournet, Andrew D. Gordon, Sergio Maffeis
A type discipline for authorization policies. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 2007, v:29, n:5, pp:- [Journal]
Verified implementations of the information card federated identity-management protocol. [Citation Graph (, )][DBLP]
Cryptographically verified implementations for TLS. [Citation Graph (, )][DBLP]
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms. [Citation Graph (, )][DBLP]
Secure Enforcement for Global Process Specifications. [Citation Graph (, )][DBLP]
Refinement Types for Secure Implementations. [Citation Graph (, )][DBLP]
A Type Discipline for Authorization in Distributed Systems. [Citation Graph (, )][DBLP]
Design and Semantics of a Decentralized Authorization Language. [Citation Graph (, )][DBLP]
Secure Implementations for Typed Session Abstractions. [Citation Graph (, )][DBLP]
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions. [Citation Graph (, )][DBLP]
A Formal Implementation of Value Commitment. [Citation Graph (, )][DBLP]
Code-Carrying Authorization. [Citation Graph (, )][DBLP]
Reliable Evidence: Auditability by Typing. [Citation Graph (, )][DBLP]
Cryptographically sound implementations for typed information-flow security. [Citation Graph (, )][DBLP]
Modular verification of security protocol code by typing. [Citation Graph (, )][DBLP]
An advisor for web services security policies. [Citation Graph (, )][DBLP]
Secure sessions for web services. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.454secs
|