Cédric Fournet
Cédric Fournet
Microsoft Research
Verified email at microsoft.com - Homepage
TitleCited byYear
Mobile values, new names, and secure communication
M Abadi, C Fournet
ACM Sigplan Notices 36 (3), 104-115, 2001
11132001
The reflexive CHAM and the join-calculus
C Edric Fournet, G Gonthier
Proceedings of the 23rd POPL, 372-385, 1996
8121996
A calculus of mobile agents
C Fournet, G Gonthier, JJ Lévy, L Maranget, D Rémy
International Conference on Concurrency Theory, 406-421, 1996
6011996
Automated verification of selected equivalences for security protocols
B Blanchet, M Abadi, C Fournet
The Journal of Logic and Algebraic Programming 75 (1), 3-51, 2008
4192008
VC3: Trustworthy data analytics in the cloud using SGX
F Schuster, M Costa, C Fournet, C Gkantsidis, M Peinado, G Mainar-Ruiz, ...
2015 IEEE Symposium on Security and Privacy, 38-54, 2015
4002015
Access Control Based on Execution History.
M Abadi, C Fournet
NDSS 3, 107-121, 2003
2652003
Refinement types for secure implementations
J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 8, 2011
2582011
Formal verification of smart contracts: Short paper
K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ...
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis …, 2016
2572016
Modern concurrency abstractions for C
N Benton, L Cardelli, C Fournet
ACM Transactions on Programming Languages and Systems (TOPLAS) 26 (5), 769-804, 2004
2452004
A messy state of the union: Taming the composite state machines of TLS
B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ...
2015 IEEE Symposium on Security and Privacy, 535-552, 2015
2282015
The join calculus: A language for distributed mobile programming
C Fournet, G Gonthier
International Summer School on Applied Semantics, 268-332, 2000
2182000
Oblivious multi-party machine learning on trusted processors
O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 619-636, 2016
2112016
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
ACM SIGPLAN Notices 46 (9), 266-278, 2011
2112011
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub
2014 IEEE Symposium on Security and Privacy, 98-113, 2014
1932014
Design and semantics of a decentralized authorization language
M Becker, C Fournet, A Gordon
20th IEEE Computer Security Foundations Symposium (CSF'07), 3-15, 2007
1932007
Verified interoperable implementations of security protocols
K Bhargavan, C Fournet, AD Gordon, S Tse
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-152, 2006
1852006
Verified interoperable implementations of security protocols
K Bhargavan, C Fournet, AD Gordon, S Tse
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-152, 2006
1852006
Private authentication
M Abadi, C Fournet
Theoretical Computer Science 322 (3), 427-476, 2004
1842004
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
ACM SIGPLAN Notices 51 (1), 256-270, 2016
1762016
Implementing TLS with verified cryptographic security
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub
2013 IEEE Symposium on Security and Privacy, 445-459, 2013
1702013
The system can't perform the operation now. Try again later.
Articles 1–20