Rocquencourt

Results: 247



#Item
81

Escape Analysis. Applications to ML and JavaTM Bruno Blanchet INRIA Rocquencourt December 2000

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2012-10-01 07:25:52
    82

    MSFPSimulating Finite Eilenberg Machines with a Reactive Engine Benoˆıt Razet1 INRIA Paris-Rocquencourt

    Add to Reading List

    Source URL: pauillac.inria.fr

    Language: English - Date: 2008-09-05 08:52:45
      83

      Ballot secrecy and ballot independence coincide Ben Smyth1 and David Bernhard2 1 INRIA Paris-Rocquencourt, France 2

      Add to Reading List

      Source URL: www.bensmyth.com

      Language: English - Date: 2013-06-24 12:47:35
        84Hacking / Cloud standards / Computer access control / Computer network security / Web development / JavaScript / HTTP cookie / Password manager / Cross-site request forgery / Cross-site scripting / Browser security / OAuth

        Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London This paper is included in the Proceedings of

        Add to Reading List

        Source URL: www.defensivejs.com

        Language: English - Date: 2013-08-15 09:17:30
        85Philosophical logic / Non-classical logic / Logic in computer science / Automated theorem proving / Logic programming / Hoare logic / Separation logic / Substitution / Modal logic / Quantifier / FO / Constructible universe

        Tactics for Separation Logic early draft Andrew W. Appel INRIA Rocquencourt & Princeton University January 13, 2006

        Add to Reading List

        Source URL: www.cs.princeton.edu

        Language: English - Date: 2006-11-29 16:23:38
        86

        Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1 INRIA Paris-Rocquencourt, France

        Add to Reading List

        Source URL: bensmyth.com

        Language: English - Date: 2014-05-14 02:07:07
          87

          Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1 INRIA Paris-Rocquencourt, France

          Add to Reading List

          Source URL: www.bensmyth.com

          Language: English - Date: 2014-03-31 03:42:07
            88

            Proved Generation of Implementations from Computationally Secure Protocol Specifications David Cad´e and Bruno Blanchet INRIA Paris-Rocquencourt, France {david.cade,bruno.blanchet}@inria.fr

            Add to Reading List

            Source URL: prosecco.gforge.inria.fr

            Language: English - Date: 2012-12-18 10:28:29
              89

              From the Applied Pi Calculus to Horn Clauses for Protocols with Lists Miriam Paiola and Bruno Blanchet INRIA Paris-Rocquencourt {paiola,blanchet}@inria.fr

              Add to Reading List

              Source URL: www2.imm.dtu.dk

              Language: English - Date: 2014-03-13 10:27:35
                90

                Formal verification of a C-like memory model and its uses for verifying program transformations Xavier Leroy () INRIA Paris-Rocquencourt Sandrine Blazy ()

                Add to Reading List

                Source URL: www.irisa.fr

                Language: English - Date: 2010-05-03 12:09:18
                  UPDATE