Karthikeyan Bhargavan, Ph.D.

Affiliations: 
2003 University of Pennsylvania, Philadelphia, PA, United States 
Area:
Computer Science
Google:
"Karthikeyan Bhargavan"

Parents

Sign in to add mentor
Carl A. Gunter grad student 2003 Penn
 (Network event recognition.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Bhargavan K. (2016) Protecting transport layer security from legacy vulnerabilities Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9665: XV
Adrian D, Bhargavan K, Durumeric Z, et al. (2015) Imperfect forward secrecy: How diffie-hellman fails in practice Proceedings of the Acm Conference On Computer and Communications Security. 2015: 5-17
Bhargavan K. (2015) Session details: Session 1B: Security Sigplan Notices. 50
Beurdouche B, Bhargavan K, Delignat-Lavaud A, et al. (2015) A messy state of the union: Taming the composite state machines of TLS Proceedings - Ieee Symposium On Security and Privacy. 2015: 535-552
Delignat-Lavaud A, Bhargavan K. (2015) Network-based origin confusion attacks against HTTPS virtual hosting Www 2015 - Proceedings of the 24th International Conference On World Wide Web. 227-237
Bansal C, Bhargavan K, Delignat-Lavaud A, et al. (2014) Discovering concrete attacks on website authorization by formal analysis Journal of Computer Security. 22: 601-657
Bhargavan K, Delignat-Lavaud A, Fournet C, et al. (2014) Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS Proceedings - Ieee Symposium On Security and Privacy. 98-113
Bhargavan K, Fournet C, Kohlweiss M, et al. (2014) Proving the TLS handshake secure (as it is) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 235-255
Bhargavan K, Fournet C, Kohlweiss M, et al. (2013) Implementing TLS with verified cryptographic security Proceedings - Ieee Symposium On Security and Privacy. 445-459
Swamy N, Chen J, Fournet C, et al. (2013) Secure distributed programming with value-dependent types Journal of Functional Programming. 23: 402-451
See more...