Mobile values, new names, and secure communication M Abadi, C Fournet ACM Sigplan Notices 36 (3), 104-115, 2001 | 1266 | 2001 |
The reflexive CHAM and the join-calculus C Fournet, G Gonthier Proceedings of the 23rd ACM SIGPLAN-SIGACT symposium on Principles of …, 1996 | 893 | 1996 |
VC3: Trustworthy data analytics in the cloud using SGX F Schuster, M Costa, C Fournet, C Gkantsidis, M Peinado, G Mainar-Ruiz, ... 2015 IEEE symposium on security and privacy, 38-54, 2015 | 863 | 2015 |
Formal verification of smart contracts: Short paper K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ... Proceedings of the 2016 ACM workshop on programming languages and analysis …, 2016 | 798 | 2016 |
Oblivious {Multi-Party} machine learning on trusted processors O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ... 25th USENIX Security Symposium (USENIX Security 16), 619-636, 2016 | 679 | 2016 |
A calculus of mobile agents C Fournet, G Gonthier, JJ Lévy, L Maranget, D Rémy CONCUR'96: Concurrency Theory: 7th International Conference Pisa, Italy …, 1996 | 647 | 1996 |
Automated verification of selected equivalences for security protocols B Blanchet, M Abadi, C Fournet The Journal of Logic and Algebraic Programming 75 (1), 3-51, 2008 | 520 | 2008 |
Dependent types and multi-monadic effects in F N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ... Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016 | 485 | 2016 |
SecPAL: Design and semantics of a decentralized authorization language MY Becker, C Fournet, AD Gordon Journal of Computer Security 18 (4), 619-665, 2010 | 465 | 2010 |
A messy state of the union: Taming the composite state machines of TLS B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ... Communications of the ACM 60 (2), 99-107, 2017 | 413 | 2017 |
Refinement types for secure implementations J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 1-45, 2011 | 327 | 2011 |
Geppetto: Versatile verifiable computation C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ... 2015 IEEE Symposium on Security and Privacy, 253-270, 2015 | 316 | 2015 |
Access Control Based on Execution History. M Abadi, C Fournet NDSS 3, 107-121, 2003 | 287 | 2003 |
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub 2014 IEEE Symposium on Security and Privacy, 98-113, 2014 | 285 | 2014 |
Secure distributed programming with value-dependent types N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang ACM SIGPLAN Notices 46 (9), 266-278, 2011 | 284 | 2011 |
Modern concurrency abstractions for C# N Benton, L Cardelli, C Fournet ACM Transactions on Programming Languages and Systems (TOPLAS) 26 (5), 769-804, 2004 | 267 | 2004 |
Implementing TLS with verified cryptographic security K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub 2013 IEEE Symposium on Security and Privacy, 445-459, 2013 | 259 | 2013 |
The join calculus: A language for distributed mobile programming C Fournet, G Gonthier International Summer School on Applied Semantics, 268-332, 2000 | 240 | 2000 |
Private authentication M Abadi, C Fournet Theoretical Computer Science 322 (3), 427-476, 2004 | 225 | 2004 |
Verified interoperable implementations of security protocols K Bhargavan, C Fournet, AD Gordon, S Tse ACM Transactions on Programming Languages and Systems (TOPLAS) 31 (1), 1-61, 2008 | 218 | 2008 |