Design and verification of a cryptoagile distributed key manager, 2010. ,
Axiomatic bootstrapping: a guide for compiler hackers, ACM Transactions on Programming Languages and Systems, vol.16, issue.6, 1994. ,
DOI : 10.1145/197320.197336
Extending Coq with Imperative Features and Its Application to SAT Verification, ITP, 2010. ,
DOI : 10.1007/978-3-642-14052-5_8
URL : https://hal.archives-ouvertes.fr/inria-00502496
Cayenne: A language with dependent types Distributed programming with distributed authorization, ICFP TLDI, 1998. ,
DOI : 10.1145/1708016.1708021
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.9360
Engineering formal metatheory, POPL, 2008. ,
DOI : 10.1145/1328438.1328443
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.5948
Sets in coq, coq in sets, J. Formalized Reasoning, 2010. ,
Refinement types for secure implementations, CSF, 2008. ,
DOI : 10.1145/1890028.1890031
URL : https://hal.archives-ouvertes.fr/hal-01294973
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, 2009 22nd IEEE Computer Security Foundations Symposium, 2009. ,
DOI : 10.1109/CSF.2009.26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.187
Modular verification of security protocol code by typing, POPL, 2010. ,
The preliminary design of the Trellys core language, PLPV, 2011. ,
Type-preserving compilation of end-toend verification of security enforcement, PLDI, 2010. ,
A verified compiler for an impure functional language, POPL, 2010. ,
DOI : 10.1145/1707801.1706312
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.2833
Ur: statically-typed metaprogramming with type-level record computation, 2010. ,
A certifying compiler for Java, PLDI, 2000. ,
DOI : 10.1145/358438.349315
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.6143
A self-verifying theorem prover, 2009. ,
Z3: An Efficient SMT Solver, TACAS, 2008. ,
DOI : 10.1007/978-3-540-78800-3_24
The Transport Layer Security (TLS) Protocol Version 1, 2008. ,
The new compiler, 1962. ,
Aura: A programming language for authorization and audit, ICFP, 2008. ,
Importing HOL Light into Coq, ITP, 2010. ,
DOI : 10.1007/978-3-642-14052-5_22
URL : https://hal.archives-ouvertes.fr/inria-00520604
A locally nameless solution to the POPLmark challenge, Research report, vol.6098, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00123945
The CompCert verified compiler, software and commented proof, 2011. ,
DOI : 10.1145/1111037.1111042
Extraction in Coq: An Overview, LTA '08, 2008. ,
DOI : 10.1007/978-3-540-69407-6_39
URL : https://hal.archives-ouvertes.fr/hal-00338973
Code-Carrying Authorization, ESORICS '08, 2008. ,
DOI : 10.1007/3-540-56610-4_62
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.9520
Epigram: Practical Programming with Dependent Types, In Advanced Functional Programming School, 2004. ,
DOI : 10.1007/11546382_3
From System F to typed assembly language, ACM Trans. Program. Lang. Syst, vol.21, issue.3, 1999. ,
A Verified Runtime for a Verified Theorem Prover, Interactive Theorem Proving, 2011. ,
DOI : 10.1007/978-3-540-71067-7_6
Ynot: dependent types for imperative programs, ICFP, 2008. ,
How to Believe a Machine-Checked Proof, Twenty-Five Years of Constructive Type Theory, 1998. ,
DOI : 10.7146/brics.v4i18.18945
Equations: A Dependent Pattern-Matching Compiler, LNCS, p.6172, 2010. ,
DOI : 10.1007/978-3-642-14052-5_29
URL : https://hal.archives-ouvertes.fr/inria-00628862
Verified programming in Guru, Proceedings of the 3rd workshop on Programming languages meets program verification, PLPV '09, 2008. ,
DOI : 10.1145/1481848.1481856
Fable: A Language for Enforcing User-defined Security Policies, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008. ,
DOI : 10.1109/SP.2008.29
Enforcing Stateful Authorization and Information Flow Policies in Fine, ESOP, 2010. ,
DOI : 10.1007/978-3-642-11957-6_28
Secure distributed programming with value-dependent types, ICFP, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00939188
Applied Type System, Types for Proofs and Programs, pp.394-408, 2003. ,
DOI : 10.1007/978-3-540-24849-1_25