Suivre
Bruno Blanchet
Bruno Blanchet
Senior researcher, INRIA Paris
Adresse e-mail validée de inria.fr - Page d'accueil
Titre
Citée par
Citée par
Année
An efficient cryptographic protocol verifier based on prolog rules.
B Blanchet
csfw 1, 82-96, 2001
14332001
A static analyzer for large safety-critical software
B Blanchet, P Cousot, R Cousot, J Feret, L Mauborgne, A Miné, ...
Proceedings of the ACM SIGPLAN 2003 conference on Programming language …, 2003
9292003
Automated verification of selected equivalences for security protocols
B Blanchet, M Abadi, C Fournet
The Journal of Logic and Algebraic Programming 75 (1), 3-51, 2008
4962008
A computationally sound mechanized prover for security protocols
B Blanchet
Dependable and Secure Computing, IEEE Transactions on 5 (4), 193-207, 2008
4612008
Escape analysis for object-oriented languages: application to Java
B Blanchet
Acm Sigplan Notices 34 (10), 20-34, 1999
3951999
Design and implementation of a special-purpose static program analyzer for safety-critical real-time embedded software
B Blanchet, P Cousot, R Cousot, J Feret, L Mauborgne, A Miné, ...
The essence of computation: complexity, analysis, transformation, 85-108, 2002
3052002
Modeling and verifying security protocols with the applied pi calculus and ProVerif
B Blanchet
Foundations and Trends® in Privacy and Security 1 (1-2), 1-135, 2016
3012016
Automatic verification of correspondences for security protocols
B Blanchet
Journal of Computer Security 17 (4), 363-434, 2009
2972009
ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial
B Blanchet, B Smyth, V Cheval, M Sylvestre
Version from, 05-16, 2018
269*2018
Automatic proof of strong secrecy for security protocols
B Blanchet
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 86-100, 2004
2432004
Verified models and reference implementations for the TLS 1.3 standard candidate
K Bhargavan, B Blanchet, N Kobeissi
2017 IEEE Symposium on Security and Privacy (SP), 483-502, 2017
2202017
Analyzing security protocols with secrecy types and logic programs
M Abadi, B Blanchet
Journal of the ACM (JACM) 52 (1), 102-146, 2005
2202005
From secrecy to authenticity in security protocols
B Blanchet
Static Analysis: 9th International Symposium, SAS 2002 Madrid, Spain …, 2002
2052002
Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach
N Kobeissi, K Bhargavan, B Blanchet
2017 IEEE European symposium on security and privacy (EuroS&P), 435-450, 2017
1612017
Automatic verification of security protocols in the symbolic model: The verifier proverif
B Blanchet
Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial …, 2014
1582014
Secrecy types for asymmetric communication
M Abadi, B Blanchet
Foundations of Software Science and Computation Structures: 4th …, 2001
1582001
ProVerif: Cryptographic protocol verifier in the formal model
B Blanchet, V Cheval, X Allamigeon, B Smyth
1522010
The applied pi calculus: Mobile values, new names, and secure communication
M Abadi, B Blanchet, C Fournet
Journal of the ACM (JACM) 65 (1), 1-41, 2017
1512017
Escape analysis for JavaTM Theory and practice
B Blanchet
ACM Transactions on Programming Languages and Systems (TOPLAS) 25 (6), 713-775, 2003
1502003
Analyzing security protocols with secrecy types and logic programs
M Abadi, B Blanchet
Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of …, 2002
1442002
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20