Mobile values, new names, and secure communication M Abadi, C Fournet ACM Sigplan Notices 36 (3), 104-115, 2001 | 1113 | 2001 |
The reflexive CHAM and the join-calculus C Edric Fournet, G Gonthier Proceedings of the 23rd POPL, 372-385, 1996 | 812 | 1996 |
A calculus of mobile agents C Fournet, G Gonthier, JJ Lévy, L Maranget, D Rémy International Conference on Concurrency Theory, 406-421, 1996 | 601 | 1996 |
Automated verification of selected equivalences for security protocols B Blanchet, M Abadi, C Fournet The Journal of Logic and Algebraic Programming 75 (1), 3-51, 2008 | 419 | 2008 |
VC3: Trustworthy data analytics in the cloud using SGX F Schuster, M Costa, C Fournet, C Gkantsidis, M Peinado, G Mainar-Ruiz, ... 2015 IEEE Symposium on Security and Privacy, 38-54, 2015 | 400 | 2015 |
Access Control Based on Execution History. M Abadi, C Fournet NDSS 3, 107-121, 2003 | 265 | 2003 |
Refinement types for secure implementations J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 8, 2011 | 258 | 2011 |
Formal verification of smart contracts: Short paper K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ... Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis …, 2016 | 257 | 2016 |
Modern concurrency abstractions for C N Benton, L Cardelli, C Fournet ACM Transactions on Programming Languages and Systems (TOPLAS) 26 (5), 769-804, 2004 | 245 | 2004 |
A messy state of the union: Taming the composite state machines of TLS B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ... 2015 IEEE Symposium on Security and Privacy, 535-552, 2015 | 228 | 2015 |
The join calculus: A language for distributed mobile programming C Fournet, G Gonthier International Summer School on Applied Semantics, 268-332, 2000 | 218 | 2000 |
Oblivious multi-party machine learning on trusted processors O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ... 25th {USENIX} Security Symposium ({USENIX} Security 16), 619-636, 2016 | 211 | 2016 |
Secure distributed programming with value-dependent types N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang ACM SIGPLAN Notices 46 (9), 266-278, 2011 | 211 | 2011 |
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub 2014 IEEE Symposium on Security and Privacy, 98-113, 2014 | 193 | 2014 |
Design and semantics of a decentralized authorization language M Becker, C Fournet, A Gordon 20th IEEE Computer Security Foundations Symposium (CSF'07), 3-15, 2007 | 193 | 2007 |
Verified interoperable implementations of security protocols K Bhargavan, C Fournet, AD Gordon, S Tse 19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-152, 2006 | 185 | 2006 |
Verified interoperable implementations of security protocols K Bhargavan, C Fournet, AD Gordon, S Tse 19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-152, 2006 | 185 | 2006 |
Private authentication M Abadi, C Fournet Theoretical Computer Science 322 (3), 427-476, 2004 | 184 | 2004 |
Dependent types and multi-monadic effects in F N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ... ACM SIGPLAN Notices 51 (1), 256-270, 2016 | 176 | 2016 |
Implementing TLS with verified cryptographic security K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub 2013 IEEE Symposium on Security and Privacy, 445-459, 2013 | 170 | 2013 |