dblp.uni-trier.dewww.uni-trier.de

Bruno Blanchet Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
35EEMartín Abadi, Bruno Blanchet, Hubert Comon-Lundh: Models and Proofs of Protocol Security: A Progress Report. CAV 2009: 35-49
34EEBruno Blanchet: Automatic verification of correspondences for security protocols. Journal of Computer Security 17(4): 363-434 (2009)
2008
33EEBruno Blanchet, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay: Computationally sound mechanized proofs for basic and public-key Kerberos. ASIACCS 2008: 87-99
32EEBruno Blanchet, Avik Chaudhuri: Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. IEEE Symposium on Security and Privacy 2008: 417-431
31EEBruno Blanchet: Automatic Verification of Correspondences for Security Protocols CoRR abs/0802.3444: (2008)
30EEBruno Blanchet: A Computationally Sound Mechanized Prover for Security Protocols. IEEE Trans. Dependable Sec. Comput. 5(4): 193-207 (2008)
29EEBruno Blanchet, Martín Abadi, Cédric Fournet: Automated verification of selected equivalences for security protocols. J. Log. Algebr. Program. 75(1): 3-51 (2008)
2007
28EEBruno Blanchet: Computationally Sound Mechanized Proofs of Correspondence Assertions. CSF 2007: 97-111
27EEMartín Abadi, Bruno Blanchet, Cédric Fournet: Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur. 10(3): (2007)
26EEBruno Blanchet, Patrick Cousot, Radhia Cousot, Jérôme Feret, Laurent Mauborgne, Antoine Miné, David Monniaux, Xavier Rival: A Static Analyzer for Large Safety-Critical Software CoRR abs/cs/0701193: (2007)
2006
25EEBruno Blanchet, David Pointcheval: Automated Security Proofs with Sequences of Games. CRYPTO 2006: 537-554
24EEBruno Blanchet: A Computationally Sound Mechanized Prover for Security Protocols. IEEE Symposium on Security and Privacy 2006: 140-154
2005
23EEXavier Allamigeon, Bruno Blanchet: Reconstruction of Attacks against Cryptographic Protocols. CSFW 2005: 140-154
22EEBruno Blanchet, Martín Abadi, Cédric Fournet: Automated Verification of Selected Equivalences for Security Protocols. LICS 2005: 331-340
21EEBruno Blanchet: Security protocols: from linear to classical logic by abstract interpretation. Inf. Process. Lett. 95(5): 473-479 (2005)
20EEMartín Abadi, Bruno Blanchet: Analyzing security protocols with secrecy types and logic programs. J. ACM 52(1): 102-146 (2005)
19EEMartín Abadi, Bruno Blanchet: Computer-assisted verification of a protocol for certified email. Sci. Comput. Program. 58(1-2): 3-27 (2005)
18EEBruno Blanchet, Andreas Podelski: Verification of cryptographic protocols: tagging enforces termination. Theor. Comput. Sci. 333(1-2): 67-90 (2005)
2004
17EEMartín Abadi, Bruno Blanchet, Cédric Fournet: Just Fast Keying in the Pi Calculus. ESOP 2004: 340-354
16EEBruno Blanchet: Automatic Proof of Strong Secrecy for Security Protocols. IEEE Symposium on Security and Privacy 2004: 86-
2003
15EEBruno Blanchet, Benjamin Aziz: A Calculus for Secure Mobility. ASIAN 2003: 188-204
14EEBruno Blanchet, Andreas Podelski: Verification of Cryptographic Protocols: Tagging Enforces Termination. FoSSaCS 2003: 136-152
13EEBruno Blanchet, Patrick Cousot, Radhia Cousot, Jérôme Feret, Laurent Mauborgne, Antoine Miné, David Monniaux, Xavier Rival: A static analyzer for large safety-critical software. PLDI 2003: 196-207
12EEBruno Blanchet: Automatic verification of cryptographic protocols: a logic programming approach. PPDP 2003: 1-3
11EEMartín Abadi, Bruno Blanchet: Computer-Assisted Verification of a Protocol for Certified Email. SAS 2003: 316-335
10EEBruno Blanchet: Escape analysis for JavaTM: Theory and practice. ACM Trans. Program. Lang. Syst. 25(6): 713-775 (2003)
9EEMartín Abadi, Bruno Blanchet: Secrecy types for asymmetric communication. Theor. Comput. Sci. 3(298): 387-415 (2003)
2002
8EEMartín Abadi, Bruno Blanchet: Analyzing security protocols with secrecy types and logic programs. POPL 2002: 33-44
7EEBruno Blanchet: From Secrecy to Authenticity in Security Protocols. SAS 2002: 342-359
6EEBruno Blanchet, Patrick Cousot, Radhia Cousot, Jérôme Feret, Laurent Mauborgne, Antoine Miné, David Monniaux, Xavier Rival: Design and Implementation of a Special-Purpose Static Program Analyzer for Safety-Critical Real-Time Embedded Software. The Essence of Computation 2002: 85-108
2001
5EEBruno Blanchet: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. CSFW 2001: 82-96
4EEMartín Abadi, Bruno Blanchet: Secrecy Types for Asymmetric Communication. FoSSaCS 2001: 25-41
3EEBruno Blanchet: Abstracting Cryptographic Protocols by Prolog Rules. SAS 2001: 433-436
1999
2EEBruno Blanchet: Escape Analysis for Object-Oriented Languages: Application to Java. OOPSLA 1999: 20-34
1998
1EEBruno Blanchet: Escape Analysis: Correctness Proof, Implementation and Experimental Results. POPL 1998: 25-37

Coauthor Index

1Martín Abadi [4] [8] [9] [11] [17] [19] [20] [22] [27] [29] [35]
2Xavier Allamigeon [23]
3Benjamin Aziz [15]
4Avik Chaudhuri [32]
5Hubert Comon-Lundh (Hubert Comon) [35]
6Patrick Cousot [6] [13] [26]
7Radhia Cousot [6] [13] [26]
8Jérôme Feret [6] [13] [26]
9Cédric Fournet [17] [22] [27] [29]
10Aaron D. Jaggard [33]
11Laurent Mauborgne [6] [13] [26]
12Antoine Miné [6] [13] [26]
13David Monniaux [6] [13] [26]
14Andreas Podelski [14] [18]
15David Pointcheval [25]
16Xavier Rival [6] [13] [26]
17Andre Scedrov [33]
18Joe-Kai Tsay [33]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)