Karthikeyan Bhargavan, Ph.D.
Affiliations: | 2003 | University of Pennsylvania, Philadelphia, PA, United States |
Area:
Computer ScienceGoogle:
"Karthikeyan Bhargavan"
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Bhargavan K. (2016) Protecting transport layer security from legacy vulnerabilities Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9665: XV |
Adrian D, Bhargavan K, Durumeric Z, et al. (2015) Imperfect forward secrecy: How diffie-hellman fails in practice Proceedings of the Acm Conference On Computer and Communications Security. 2015: 5-17 |
Bhargavan K. (2015) Session details: Session 1B: Security Sigplan Notices. 50 |
Beurdouche B, Bhargavan K, Delignat-Lavaud A, et al. (2015) A messy state of the union: Taming the composite state machines of TLS Proceedings - Ieee Symposium On Security and Privacy. 2015: 535-552 |
Delignat-Lavaud A, Bhargavan K. (2015) Network-based origin confusion attacks against HTTPS virtual hosting Www 2015 - Proceedings of the 24th International Conference On World Wide Web. 227-237 |
Bansal C, Bhargavan K, Delignat-Lavaud A, et al. (2014) Discovering concrete attacks on website authorization by formal analysis Journal of Computer Security. 22: 601-657 |
Bhargavan K, Delignat-Lavaud A, Fournet C, et al. (2014) Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS Proceedings - Ieee Symposium On Security and Privacy. 98-113 |
Bhargavan K, Fournet C, Kohlweiss M, et al. (2014) Proving the TLS handshake secure (as it is) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 235-255 |
Bhargavan K, Fournet C, Kohlweiss M, et al. (2013) Implementing TLS with verified cryptographic security Proceedings - Ieee Symposium On Security and Privacy. 445-459 |
Swamy N, Chen J, Fournet C, et al. (2013) Secure distributed programming with value-dependent types Journal of Functional Programming. 23: 402-451 |