Follow
Cédric Fournet
Cédric Fournet
Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Mobile values, new names, and secure communication
M Abadi, C Fournet
ACM Sigplan Notices 36 (3), 104-115, 2001
12642001
The reflexive CHAM and the join-calculus
C Fournet, G Gonthier
Proceedings of the 23rd ACM SIGPLAN-SIGACT symposium on Principles of …, 1996
8891996
VC3: Trustworthy data analytics in the cloud using SGX
F Schuster, M Costa, C Fournet, C Gkantsidis, M Peinado, G Mainar-Ruiz, ...
2015 IEEE symposium on security and privacy, 38-54, 2015
8582015
Formal verification of smart contracts: Short paper
K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ...
Proceedings of the 2016 ACM workshop on programming languages and analysis …, 2016
7862016
Oblivious {Multi-Party} machine learning on trusted processors
O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ...
25th USENIX Security Symposium (USENIX Security 16), 619-636, 2016
6652016
A calculus of mobile agents
C Fournet, G Gonthier, JJ Lévy, L Maranget, D Rémy
CONCUR'96: Concurrency Theory: 7th International Conference Pisa, Italy …, 1996
6441996
Automated verification of selected equivalences for security protocols
B Blanchet, M Abadi, C Fournet
The Journal of Logic and Algebraic Programming 75 (1), 3-51, 2008
5182008
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016
4762016
SecPAL: Design and semantics of a decentralized authorization language
MY Becker, C Fournet, AD Gordon
Journal of Computer Security 18 (4), 619-665, 2010
4632010
A messy state of the union: Taming the composite state machines of TLS
B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ...
Communications of the ACM 60 (2), 99-107, 2017
4062017
Refinement types for secure implementations
J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 1-45, 2011
3242011
Geppetto: Versatile verifiable computation
C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ...
2015 IEEE Symposium on Security and Privacy, 253-270, 2015
3132015
Access Control Based on Execution History.
M Abadi, C Fournet
NDSS 3, 107-121, 2003
2862003
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub
2014 IEEE Symposium on Security and Privacy, 98-113, 2014
2842014
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
ACM SIGPLAN Notices 46 (9), 266-278, 2011
2822011
Modern concurrency abstractions for C#
N Benton, L Cardelli, C Fournet
ACM Transactions on Programming Languages and Systems (TOPLAS) 26 (5), 769-804, 2004
2662004
Implementing TLS with verified cryptographic security
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub
2013 IEEE Symposium on Security and Privacy, 445-459, 2013
2572013
The join calculus: A language for distributed mobile programming
C Fournet, G Gonthier
International Summer School on Applied Semantics, 268-332, 2000
2372000
Private authentication
M Abadi, C Fournet
Theoretical Computer Science 322 (3), 427-476, 2004
2252004
Verified interoperable implementations of security protocols
K Bhargavan, C Fournet, AD Gordon, S Tse
ACM Transactions on Programming Languages and Systems (TOPLAS) 31 (1), 1-61, 2008
2182008
The system can't perform the operation now. Try again later.
Articles 1–20