Search the dblp DataBase
Bruno Blanchet :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Bruno Blanchet , Benjamin Aziz A Calculus for Secure Mobility. [Citation Graph (0, 0)][DBLP ] ASIAN, 2003, pp:188-204 [Conf ] Bruno Blanchet , Patrick Cousot , Radhia Cousot , Jérôme Feret , Laurent Mauborgne , Antoine Miné , David Monniaux , Xavier Rival Design and Implementation of a Special-Purpose Static Program Analyzer for Safety-Critical Real-Time Embedded Software. [Citation Graph (0, 0)][DBLP ] The Essence of Computation, 2002, pp:85-108 [Conf ] Bruno Blanchet , David Pointcheval Automated Security Proofs with Sequences of Games. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:537-554 [Conf ] Xavier Allamigeon , Bruno Blanchet Reconstruction of Attacks against Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:140-154 [Conf ] Bruno Blanchet An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:82-96 [Conf ] Martín Abadi , Bruno Blanchet , Cédric Fournet Just Fast Keying in the Pi Calculus. [Citation Graph (0, 0)][DBLP ] ESOP, 2004, pp:340-354 [Conf ] Martín Abadi , Bruno Blanchet Secrecy Types for Asymmetric Communication. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 2001, pp:25-41 [Conf ] Bruno Blanchet , Andreas Podelski Verification of Cryptographic Protocols: Tagging Enforces Termination. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 2003, pp:136-152 [Conf ] Bruno Blanchet , Martín Abadi , Cédric Fournet Automated Verification of Selected Equivalences for Security Protocols. [Citation Graph (0, 0)][DBLP ] LICS, 2005, pp:331-340 [Conf ] Bruno Blanchet Escape Analysis for Object-Oriented Languages: Application to Java. [Citation Graph (0, 0)][DBLP ] OOPSLA, 1999, pp:20-34 [Conf ] Bruno Blanchet , Patrick Cousot , Radhia Cousot , Jérôme Feret , Laurent Mauborgne , Antoine Miné , David Monniaux , Xavier Rival A static analyzer for large safety-critical software. [Citation Graph (0, 0)][DBLP ] PLDI, 2003, pp:196-207 [Conf ] Martín Abadi , Bruno Blanchet Analyzing security protocols with secrecy types and logic programs. [Citation Graph (0, 0)][DBLP ] POPL, 2002, pp:33-44 [Conf ] Bruno Blanchet Escape Analysis: Correctness Proof, Implementation and Experimental Results. [Citation Graph (0, 0)][DBLP ] POPL, 1998, pp:25-37 [Conf ] Bruno Blanchet Automatic verification of cryptographic protocols: a logic programming approach. [Citation Graph (0, 0)][DBLP ] PPDP, 2003, pp:1-3 [Conf ] Martín Abadi , Bruno Blanchet Computer-Assisted Verification of a Protocol for Certified Email. [Citation Graph (0, 0)][DBLP ] SAS, 2003, pp:316-335 [Conf ] Bruno Blanchet Abstracting Cryptographic Protocols by Prolog Rules. [Citation Graph (0, 0)][DBLP ] SAS, 2001, pp:433-436 [Conf ] Bruno Blanchet From Secrecy to Authenticity in Security Protocols. [Citation Graph (0, 0)][DBLP ] SAS, 2002, pp:342-359 [Conf ] Bruno Blanchet Automatic Proof of Strong Secrecy for Security Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:86-0 [Conf ] Bruno Blanchet A Computationally Sound Mechanized Prover for Security Protocols. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:140-154 [Conf ] Bruno Blanchet Security protocols: from linear to classical logic by abstract interpretation. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2005, v:95, n:5, pp:473-479 [Journal ] Martín Abadi , Bruno Blanchet Analyzing security protocols with secrecy types and logic programs. [Citation Graph (0, 0)][DBLP ] J. ACM, 2005, v:52, n:1, pp:102-146 [Journal ] Martín Abadi , Bruno Blanchet Computer-assisted verification of a protocol for certified email. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2005, v:58, n:1-2, pp:3-27 [Journal ] Martín Abadi , Bruno Blanchet Secrecy types for asymmetric communication. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2003, v:3, n:298, pp:387-415 [Journal ] Bruno Blanchet , Andreas Podelski Verification of cryptographic protocols: tagging enforces termination. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2005, v:333, n:1-2, pp:67-90 [Journal ] Bruno Blanchet Escape analysis for JavaTM : Theory and practice. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 2003, v:25, n:6, pp:713-775 [Journal ] Bruno Blanchet , Patrick Cousot , Radhia Cousot , Jérôme Feret , Laurent Mauborgne , Antoine Miné , David Monniaux , Xavier Rival A Static Analyzer for Large Safety-Critical Software [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Martín Abadi , Bruno Blanchet , Cédric Fournet Just fast keying in the pi calculus. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal ] Models and Proofs of Protocol Security: A Progress Report. [Citation Graph (, )][DBLP ] Computationally sound mechanized proofs for basic and public-key Kerberos. [Citation Graph (, )][DBLP ] Computationally Sound Mechanized Proofs of Correspondence Assertions. [Citation Graph (, )][DBLP ] Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. [Citation Graph (, )][DBLP ] Automatic Verification of Correspondences for Security Protocols [Citation Graph (, )][DBLP ] Search in 0.057secs, Finished in 0.059secs