Cédric Fournet
Cédric Fournet
Microsoft Research
Verified email at microsoft.com - Homepage
TitleCited byYear
Mobile values, new names, and secure communication
M Abadi, C Fournet
ACM Sigplan Notices 36 (3), 104-115, 2001
11112001
The reflexive CHAM and the join-calculus
C Fournet, G Gonthier
Proceedings of the 23rd ACM SIGPLAN-SIGACT symposium on Principles of …, 1996
8141996
A calculus of mobile agents
C Fournet, G Gonthier, JJ Lévy, L Maranget, D Rémy
International Conference on Concurrency Theory, 406-421, 1996
6091996
VC3: Trustworthy data analytics in the cloud using SGX
F Schuster, M Costa, C Fournet, C Gkantsidis, M Peinado, G Mainar-Ruiz, ...
2015 IEEE Symposium on Security and Privacy, 38-54, 2015
4242015
Automated verification of selected equivalences for security protocols
B Blanchet, M Abadi, C Fournet
The Journal of Logic and Algebraic Programming 75 (1), 3-51, 2008
4222008
SecPAL: Design and semantics of a decentralized authorization language
MY Becker, C Fournet, AD Gordon
Journal of Computer Security 18 (4), 619-665, 2010
4082010
SecPAL: Design and semantics of a decentralized authorization language
MY Becker, C Fournet, AD Gordon
Journal of Computer Security 18 (4), 619-665, 2010
4082010
SecPAL: Design and semantics of a decentralized authorization language
MY Becker, C Fournet, AD Gordon
Journal of Computer Security 18 (4), 619-665, 2010
4082010
Formal verification of smart contracts: Short paper
K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ...
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis …, 2016
2872016
Refinement types for secure implementations
J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 1-45, 2011
2652011
Access Control Based on Execution History.
M Abadi, C Fournet
NDSS 3, 107-121, 2003
2652003
Modern concurrency abstractions for C#
N Benton, L Cardelli, C Fournet
ACM Transactions on Programming Languages and Systems (TOPLAS) 26 (5), 769-804, 2004
2482004
A messy state of the union: Taming the composite state machines of TLS
B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ...
2015 IEEE Symposium on Security and Privacy, 535-552, 2015
2342015
Oblivious multi-party machine learning on trusted processors
O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 619-636, 2016
2312016
The join calculus: A language for distributed mobile programming
C Fournet, G Gonthier
International Summer School on Applied Semantics, 268-332, 2000
2232000
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
ACM SIGPLAN Notices 46 (9), 266-278, 2011
2172011
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub
2014 IEEE Symposium on Security and Privacy, 98-113, 2014
1992014
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016
1952016
Verified interoperable implementations of security protocols
K Bhargavan, C Fournet, AD Gordon, S Tse
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-152, 2006
1892006
Verified interoperable implementations of security protocols
K Bhargavan, C Fournet, AD Gordon, S Tse
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-152, 2006
1892006
The system can't perform the operation now. Try again later.
Articles 1–20