Seguir
Nikhil Swamy
Nikhil Swamy
Microsoft Research
Dirección de correo verificada de microsoft.com - Página principal
Título
Citado por
Citado por
Año
Formal verification of smart contracts: Short paper
K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ...
Proceedings of the 2016 ACM workshop on programming languages and analysis …, 2016
7792016
Defeating script injection attacks with browser-enforced embedded policies
T Jim, N Swamy, M Hicks
Proceedings of the 16th international conference on World Wide Web, 601-610, 2007
4852007
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016
4682016
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
ACM SIGPLAN Notices 46 (9), 266-278, 2011
2822011
Quantum computing applications of genetic programming
L Spector, H Barnum, HJ Bernstein, N Swamy
191*1999
Safe & efficient gradual typing for TypeScript
A Rastogi, N Swamy, C Fournet, G Bierman, P Vekris
Proceedings of the 42Nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2015
1682015
Verified security for browser extensions
A Guha, M Fredrikson, B Livshits, N Swamy
2011 IEEE symposium on security and privacy, 115-130, 2011
1652011
Fable: A language for enforcing user-defined security policies
N Swamy, BJ Corcoran, M Hicks
2008 IEEE Symposium on Security and Privacy (sp 2008), 369-383, 2008
1612008
Finding a better-than-classical quantum AND/OR algorithm using genetic programming
L Spector, H Barnum, HJ Bernstein, N Swamy
Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No …, 1999
1581999
Verifying higher-order programs with the Dijkstra monad
N Swamy, J Weinberger, C Schlesinger, J Chen, B Livshits
ACM SIGPLAN Notices 48 (6), 387-398, 2013
1552013
Verified low-level programming embedded in F
J Protzenko, JK Zinzindohoué, A Rastogi, T Ramananandro, P Wang, ...
Proceedings of the ACM on Programming Languages 1 (ICFP), 1-29, 2017
1512017
Probabilistic relational verification for cryptographic implementations
G Barthe, C Fournet, B Grégoire, PY Strub, N Swamy, S Zanella-Béguelin
ACM SIGPLAN Notices 49 (1), 193-205, 2014
1342014
Fully abstract compilation to JavaScript
C Fournet, N Swamy, J Chen, PE Dagand, PY Strub, B Livshits
Proceedings of the 40th annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2013
1312013
Evercrypt: A fast, verified, cross-platform cryptographic provider
J Protzenko, B Parno, A Fromherz, C Hawblitzel, M Polubelova, ...
2020 IEEE Symposium on Security and Privacy (SP), 983-1002, 2020
1192020
Enforcing Stateful Authorization and Information Flow Policies in Fine
N Swamy, J Chen, R Chugh
Programming Languages and Systems: 19th European Symposium on Programming …, 2010
1062010
Implementing and proving the TLS 1.3 record layer
A Delignat-Lavaud, C Fournet, M Kohlweiss, J Protzenko, A Rastogi, ...
2017 IEEE Symposium on Security and Privacy (SP), 463-482, 2017
1042017
Finding and removing performance bottlenecks in large systems
G Ammons, JD Choi, M Gupta, N Swamy
ECOOP 2004–Object-Oriented Programming: 18th European Conference, Oslo …, 2004
982004
Everest: Towards a verified, drop-in replacement of HTTPS
K Bhargavan, B Bond, A Delignat-Lavaud, C Fournet, C Hawblitzel, ...
2nd Summit on Advances in Programming Languages, 2017
932017
Gradual typing embedded securely in JavaScript
N Swamy, C Fournet, A Rastogi, K Bhargavan, J Chen, PY Strub, ...
ACM SIGPLAN Notices 49 (1), 425-437, 2014
902014
Cross-tier, label-based security enforcement for web applications
BJ Corcoran, N Swamy, M Hicks
Proceedings of the 2009 ACM SIGMOD International Conference on Management of …, 2009
892009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20