The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Karthikeyan Bhargavan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
    Verifying policy-based security for web services. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:268-277 [Conf]
  2. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse
    Verified Interoperable Implementations of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:139-152 [Conf]
  3. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella
    TulaFale: A Security Tool for Web Services. [Citation Graph (0, 0)][DBLP]
    FMCO, 2003, pp:197-222 [Conf]
  4. Karthikeyan Bhargavan, Carl A. Gunter, Davor Obradovic
    Fault origin adjudication. [Citation Graph (0, 0)][DBLP]
    FMSP, 2000, pp:61-71 [Conf]
  5. Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan
    Verisim: Formal analysis of network simulations. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2000, pp:2-13 [Conf]
  6. Marc Shapiro, Karthikeyan Bhargavan, Nishith Krishna
    A Constraint-Based Formalism for Consistency in Replicated Systems. [Citation Graph (0, 0)][DBLP]
    OPODIS, 2004, pp:331-345 [Conf]
  7. Nishith Krishna, Marc Shapiro, Karthikeyan Bhargavan
    Brief announcement: exploring the consistency problem space. [Citation Graph (0, 0)][DBLP]
    PODC, 2005, pp:168- [Conf]
  8. Karthikeyan Bhargavan, Satish Chandra, Peter J. McCann, Carl A. Gunter
    What packets may come: automata for network monitoring. [Citation Graph (0, 0)][DBLP]
    POPL, 2001, pp:206-219 [Conf]
  9. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
    A semantics for web services authentication. [Citation Graph (0, 0)][DBLP]
    POPL, 2004, pp:198-209 [Conf]
  10. Karthikeyan Bhargavan, Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Davor Obradovic, Pamela Zave
    The Village Telephone System: A Case Study in Formal Software Engineering. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1998, pp:49-66 [Conf]
  11. Karthikeyan Bhargavan, Carl A. Gunter, Davor Obradovic
    Routing Information Protocol in HOL/SPIN. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 2000, pp:53-72 [Conf]
  12. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
    Verified Reference Implementations of WS-Security Protocols. [Citation Graph (0, 0)][DBLP]
    WS-FM, 2006, pp:88-106 [Conf]
  13. Karthikeyan Bhargavan, Carl A. Gunter
    Requirements for a Practical Network Event Recognition Language. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2002, v:70, n:4, pp:- [Journal]
  14. Karthikeyan Bhargavan, Carl A. Gunter
    Network Event Recognition. [Citation Graph (0, 0)][DBLP]
    Formal Methods in System Design, 2005, v:27, n:3, pp:213-251 [Journal]
  15. Karthikeyan Bhargavan, Davor Obradovic, Carl A. Gunter
    Formal verification of standards for distance vector routing protocols. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2002, v:49, n:4, pp:538-576 [Journal]
  16. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
    A semantics for web services authentication. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:340, n:1, pp:102-153 [Journal]
  17. Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan
    Verisim: Formal Analysis of Network Simulations. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2002, v:28, n:2, pp:129-145 [Journal]
  18. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella
    TulaFale: A Security Tool for Web Services [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  19. Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon
    Secure sessions for Web services. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal]

  20. Verified implementations of the information card federated identity-management protocol. [Citation Graph (, )][DBLP]


  21. Cryptographically verified implementations for TLS. [Citation Graph (, )][DBLP]


  22. Service Combinators for Farming Virtual Machines. [Citation Graph (, )][DBLP]


  23. Refinement Types for Secure Implementations. [Citation Graph (, )][DBLP]


  24. Secure Implementations for Typed Session Abstractions. [Citation Graph (, )][DBLP]


  25. Cryptographic Protocol Synthesis and Verification for Multiparty Sessions. [Citation Graph (, )][DBLP]


  26. Modular verification of security protocol code by typing. [Citation Graph (, )][DBLP]


  27. Service Combinators for Farming Virtual Machines. [Citation Graph (, )][DBLP]


  28. A compositional theory for STM Haskell. [Citation Graph (, )][DBLP]


  29. An advisor for web services security policies. [Citation Graph (, )][DBLP]


  30. Secure sessions for web services. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002