Seguir
Nikhil Swamy
Nikhil Swamy
Microsoft Research
Dirección de correo verificada de microsoft.com - Página principal
Título
Citado por
Citado por
Año
Formal verification of smart contracts: Short paper
K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ...
Proceedings of the 2016 ACM workshop on programming languages and analysis …, 2016
7452016
Defeating script injection attacks with browser-enforced embedded policies
T Jim, N Swamy, M Hicks
Proceedings of the 16th international conference on World Wide Web, 601-610, 2007
4862007
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016
4462016
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
ACM SIGPLAN Notices 46 (9), 266-278, 2011
2782011
Quantum computing applications of genetic programming
L Spector, H Barnum, HJ Bernstein, N Swamy
187*1999
Verified security for browser extensions
A Guha, M Fredrikson, B Livshits, N Swamy
2011 IEEE symposium on security and privacy, 115-130, 2011
1642011
Safe & efficient gradual typing for TypeScript
A Rastogi, N Swamy, C Fournet, G Bierman, P Vekris
Proceedings of the 42Nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2015
1602015
Fable: A language for enforcing user-defined security policies
N Swamy, BJ Corcoran, M Hicks
2008 IEEE Symposium on Security and Privacy (sp 2008), 369-383, 2008
1602008
Finding a better-than-classical quantum AND/OR algorithm using genetic programming
L Spector, H Barnum, HJ Bernstein, N Swamy
Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No …, 1999
1541999
Verifying higher-order programs with the Dijkstra monad
N Swamy, J Weinberger, C Schlesinger, J Chen, B Livshits
ACM SIGPLAN Notices 48 (6), 387-398, 2013
1532013
Verified low-level programming embedded in F
J Protzenko, JK Zinzindohoué, A Rastogi, T Ramananandro, P Wang, ...
Proceedings of the ACM on Programming Languages 1 (ICFP), 1-29, 2017
1392017
Probabilistic relational verification for cryptographic implementations
G Barthe, C Fournet, B Grégoire, PY Strub, N Swamy, S Zanella-Béguelin
ACM SIGPLAN Notices 49 (1), 193-205, 2014
1342014
Fully abstract compilation to JavaScript
C Fournet, N Swamy, J Chen, PE Dagand, PY Strub, B Livshits
Proceedings of the 40th annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2013
1312013
Evercrypt: A fast, verified, cross-platform cryptographic provider
J Protzenko, B Parno, A Fromherz, C Hawblitzel, M Polubelova, ...
2020 IEEE Symposium on Security and Privacy (SP), 983-1002, 2020
1072020
Enforcing Stateful Authorization and Information Flow Policies in Fine
N Swamy, J Chen, R Chugh
Programming Languages and Systems: 19th European Symposium on Programming …, 2010
1062010
Implementing and proving the TLS 1.3 record layer
A Delignat-Lavaud, C Fournet, M Kohlweiss, J Protzenko, A Rastogi, ...
2017 IEEE Symposium on Security and Privacy (SP), 463-482, 2017
1042017
Finding and removing performance bottlenecks in large systems
G Ammons, JD Choi, M Gupta, N Swamy
ECOOP 2004–Object-Oriented Programming: 18th European Conference, Oslo …, 2004
962004
Everest: Towards a verified, drop-in replacement of HTTPS
K Bhargavan, B Bond, A Delignat-Lavaud, C Fournet, C Hawblitzel, ...
2nd Summit on Advances in Programming Languages, 2017
912017
Gradual typing embedded securely in JavaScript
N Swamy, C Fournet, A Rastogi, K Bhargavan, J Chen, PY Strub, ...
ACM SIGPLAN Notices 49 (1), 425-437, 2014
882014
Cross-tier, label-based security enforcement for web applications
BJ Corcoran, N Swamy, M Hicks
Proceedings of the 2009 ACM SIGMOD International Conference on Management of …, 2009
882009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20