2008 |
33 | EE | Bruno Blanchet,
Aaron D. Jaggard,
Andre Scedrov,
Joe-Kai Tsay:
Computationally sound mechanized proofs for basic and public-key Kerberos.
ASIACCS 2008: 87-99 |
32 | EE | Bruno Blanchet,
Avik Chaudhuri:
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage.
IEEE Symposium on Security and Privacy 2008: 417-431 |
31 | EE | Bruno Blanchet:
Automatic Verification of Correspondences for Security Protocols
CoRR abs/0802.3444: (2008) |
30 | EE | Bruno Blanchet:
A Computationally Sound Mechanized Prover for Security Protocols.
IEEE Trans. Dependable Sec. Comput. 5(4): 193-207 (2008) |
29 | EE | Bruno Blanchet,
Martín Abadi,
Cédric Fournet:
Automated verification of selected equivalences for security protocols.
J. Log. Algebr. Program. 75(1): 3-51 (2008) |
2007 |
28 | EE | Bruno Blanchet:
Computationally Sound Mechanized Proofs of Correspondence Assertions.
CSF 2007: 97-111 |
27 | EE | Martín Abadi,
Bruno Blanchet,
Cédric Fournet:
Just fast keying in the pi calculus.
ACM Trans. Inf. Syst. Secur. 10(3): (2007) |
26 | EE | Bruno Blanchet,
Patrick Cousot,
Radhia Cousot,
Jérôme Feret,
Laurent Mauborgne,
Antoine Miné,
David Monniaux,
Xavier Rival:
A Static Analyzer for Large Safety-Critical Software
CoRR abs/cs/0701193: (2007) |
2006 |
25 | EE | Bruno Blanchet,
David Pointcheval:
Automated Security Proofs with Sequences of Games.
CRYPTO 2006: 537-554 |
24 | EE | Bruno Blanchet:
A Computationally Sound Mechanized Prover for Security Protocols.
IEEE Symposium on Security and Privacy 2006: 140-154 |
2005 |
23 | EE | Xavier Allamigeon,
Bruno Blanchet:
Reconstruction of Attacks against Cryptographic Protocols.
CSFW 2005: 140-154 |
22 | EE | Bruno Blanchet,
Martín Abadi,
Cédric Fournet:
Automated Verification of Selected Equivalences for Security Protocols.
LICS 2005: 331-340 |
21 | EE | Bruno Blanchet:
Security protocols: from linear to classical logic by abstract interpretation.
Inf. Process. Lett. 95(5): 473-479 (2005) |
20 | EE | Martín Abadi,
Bruno Blanchet:
Analyzing security protocols with secrecy types and logic programs.
J. ACM 52(1): 102-146 (2005) |
19 | EE | Martín Abadi,
Bruno Blanchet:
Computer-assisted verification of a protocol for certified email.
Sci. Comput. Program. 58(1-2): 3-27 (2005) |
18 | EE | Bruno Blanchet,
Andreas Podelski:
Verification of cryptographic protocols: tagging enforces termination.
Theor. Comput. Sci. 333(1-2): 67-90 (2005) |
2004 |
17 | EE | Martín Abadi,
Bruno Blanchet,
Cédric Fournet:
Just Fast Keying in the Pi Calculus.
ESOP 2004: 340-354 |
16 | EE | Bruno Blanchet:
Automatic Proof of Strong Secrecy for Security Protocols.
IEEE Symposium on Security and Privacy 2004: 86- |
2003 |
15 | EE | Bruno Blanchet,
Benjamin Aziz:
A Calculus for Secure Mobility.
ASIAN 2003: 188-204 |
14 | EE | Bruno Blanchet,
Andreas Podelski:
Verification of Cryptographic Protocols: Tagging Enforces Termination.
FoSSaCS 2003: 136-152 |
13 | EE | Bruno Blanchet,
Patrick Cousot,
Radhia Cousot,
Jérôme Feret,
Laurent Mauborgne,
Antoine Miné,
David Monniaux,
Xavier Rival:
A static analyzer for large safety-critical software.
PLDI 2003: 196-207 |
12 | EE | Bruno Blanchet:
Automatic verification of cryptographic protocols: a logic programming approach.
PPDP 2003: 1-3 |
11 | EE | Martín Abadi,
Bruno Blanchet:
Computer-Assisted Verification of a Protocol for Certified Email.
SAS 2003: 316-335 |
10 | EE | Bruno Blanchet:
Escape analysis for JavaTM: Theory and practice.
ACM Trans. Program. Lang. Syst. 25(6): 713-775 (2003) |
9 | EE | Martín Abadi,
Bruno Blanchet:
Secrecy types for asymmetric communication.
Theor. Comput. Sci. 3(298): 387-415 (2003) |
2002 |
8 | EE | Martín Abadi,
Bruno Blanchet:
Analyzing security protocols with secrecy types and logic programs.
POPL 2002: 33-44 |
7 | EE | Bruno Blanchet:
From Secrecy to Authenticity in Security Protocols.
SAS 2002: 342-359 |
6 | EE | Bruno Blanchet,
Patrick Cousot,
Radhia Cousot,
Jérôme Feret,
Laurent Mauborgne,
Antoine Miné,
David Monniaux,
Xavier Rival:
Design and Implementation of a Special-Purpose Static Program Analyzer for Safety-Critical Real-Time Embedded Software.
The Essence of Computation 2002: 85-108 |
2001 |
5 | EE | Bruno Blanchet:
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules.
CSFW 2001: 82-96 |
4 | EE | Martín Abadi,
Bruno Blanchet:
Secrecy Types for Asymmetric Communication.
FoSSaCS 2001: 25-41 |
3 | EE | Bruno Blanchet:
Abstracting Cryptographic Protocols by Prolog Rules.
SAS 2001: 433-436 |
1999 |
2 | EE | Bruno Blanchet:
Escape Analysis for Object-Oriented Languages: Application to Java.
OOPSLA 1999: 20-34 |
1998 |
1 | EE | Bruno Blanchet:
Escape Analysis: Correctness Proof, Implementation and Experimental Results.
POPL 1998: 25-37 |