The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Vitaly Shmatikov: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Justin Brickell, Vitaly Shmatikov
    Privacy-Preserving Graph Algorithms in the Semi-honest Model. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:236-252 [Conf]
  2. Prateek Gupta, Vitaly Shmatikov
    Towards computationally sound symbolic analysis of key exchange protocols. [Citation Graph (0, 0)][DBLP]
    FMSE, 2005, pp:23-32 [Conf]
  3. Jonathan K. Millen, Vitaly Shmatikov
    Constraint solving for bounded-process cryptographic protocol analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:166-175 [Conf]
  4. Arvind Narayanan, Vitaly Shmatikov
    Obfuscated databases and group privacy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:102-111 [Conf]
  5. Arvind Narayanan, Vitaly Shmatikov
    Fast dictionary attacks on passwords using time-space tradeoff. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:364-372 [Conf]
  6. Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov
    Contract Signing, Optimism, and Advantage. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2003, pp:361-377 [Conf]
  7. Jonathan K. Millen, Vitaly Shmatikov
    Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:47-61 [Conf]
  8. Vitaly Shmatikov, Ulrich Stern
    Efficient Finite-State Analysis for Large Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:106-115 [Conf]
  9. Ajay Mahimkar, Vitaly Shmatikov
    Game-Based Analysis of Denial-of-Service Prevention Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:287-301 [Conf]
  10. Vitaly Shmatikov
    Probabilistic Analysis of Anonymity. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:119-128 [Conf]
  11. Viviana Bono, Amit Patel, Vitaly Shmatikov
    A Core Calculus of Classes and Mixins. [Citation Graph (0, 0)][DBLP]
    ECOOP, 1999, pp:43-66 [Conf]
  12. Vitaly Shmatikov
    Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation. [Citation Graph (0, 0)][DBLP]
    ESOP, 2004, pp:355-369 [Conf]
  13. Vitaly Shmatikov, Ming-Hsiu Wang
    Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:18-33 [Conf]
  14. Stanislaw Jarecki, Vitaly Shmatikov
    Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:590-608 [Conf]
  15. Gethin Norman, Vitaly Shmatikov
    Analysis of Probabilistic Contract Signing. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:81-96 [Conf]
  16. Stanislaw Jarecki, Vitaly Shmatikov
    Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:172-187 [Conf]
  17. Vitaly Shmatikov, John C. Mitchell
    Analysis of Abuse-Free Contract Signing. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:174-191 [Conf]
  18. Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani
    Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:16-29 [Conf]
  19. Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov
    Negotiated Privacy: (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:96-111 [Conf]
  20. Justin Brickell, Vitaly Shmatikov
    Efficient anonymity-preserving data collection. [Citation Graph (0, 0)][DBLP]
    KDD, 2006, pp:76-85 [Conf]
  21. Hubert Comon-Lundh, Vitaly Shmatikov
    Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or. [Citation Graph (0, 0)][DBLP]
    LICS, 2003, pp:271-0 [Conf]
  22. Vitaly Shmatikov, John C. Mitchell
    Analysis of a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  23. Roger Dingledine, Vitaly Shmatikov, Paul F. Syverson
    Synchronous Batching: From Cascades to Free Routes. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:186-206 [Conf]
  24. Patrick Lincoln, Phillip A. Porras, Vitaly Shmatikov
    Privacy-Preserving Sharing and Correlation of Security Alerts. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:239-254 [Conf]
  25. Viviana Bono, John C. Mitchell, Amit Patel, Vitaly Shmatikov
    A Core Calculus of Classes and Objects. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1999, v:20, n:, pp:- [Journal]
  26. Dominic Hughes, Vitaly Shmatikov
    Information Hiding, Anonymity and Privacy: a Modular Approach. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:1, pp:3-36 [Journal]
  27. Jonathan K. Millen, Vitaly Shmatikov
    Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:3, pp:515-564 [Journal]
  28. Jonathan K. Millen, Vitaly Shmatikov
    Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:4, pp:695-0 [Journal]
  29. Vitaly Shmatikov
    Probabilistic analysis of an anonymity system. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:355-377 [Journal]
  30. Vitaly Shmatikov, Carolyn L. Talcott
    Reputation-based trust management. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:1, pp:167-190 [Journal]
  31. Gethin Norman, Vitaly Shmatikov
    Analysis of probabilistic contract signing. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:6, pp:561-589 [Journal]
  32. Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov
    Contract signing, optimism, and advantage. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2005, v:64, n:2, pp:189-218 [Journal]
  33. Vitaly Shmatikov, John C. Mitchell
    Finite-state analysis of two contract signing protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:283, n:2, pp:419-450 [Journal]
  34. Vitaly Shmatikov, Ming-Hsiu Wang
    Secure Verification of Location Claims with Simultaneous Distance Modification. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:181-195 [Conf]
  35. Stanislaw Jarecki, Vitaly Shmatikov
    Efficient Two-Party Secure Computation on Committed Inputs. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:97-114 [Conf]
  36. Ajay Mahimkar, Jasraj Dange, Vitaly Shmatikov, Harrick M. Vin, Yin Zhang
    dFence: Transparent Network-based Denial of Service Mitigation. [Citation Graph (0, 0)][DBLP]
    NSDI, 2007, pp:- [Conf]
  37. Phillip A. Porras, Vitaly Shmatikov
    Large-scale collection and sanitization of network security data: risks and challenges. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:57-64 [Conf]
  38. Edmund L. Wong, Praveen Balasubramanian, Lorenzo Alvisi, Mohamed G. Gouda, Vitaly Shmatikov
    Truth in advertising: lightweight verification of route integrity. [Citation Graph (0, 0)][DBLP]
    PODC, 2007, pp:147-156 [Conf]
  39. Arvind Narayanan, Vitaly Shmatikov
    How To Break Anonymity of the Netflix Prize Dataset [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  40. Privacy-preserving remote diagnostics. [Citation Graph (, )][DBLP]


  41. Security Analysis of Voice-over-IP Protocols. [Citation Graph (, )][DBLP]


  42. Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities. [Citation Graph (, )][DBLP]


  43. Privacy-Preserving Classifier Learning. [Citation Graph (, )][DBLP]


  44. The cost of privacy: destruction of data-mining utility in anonymized data publishing. [Citation Graph (, )][DBLP]


  45. Airavat: Security and Privacy for MapReduce. [Citation Graph (, )][DBLP]


  46. Robust De-anonymization of Large Sparse Datasets. [Citation Graph (, )][DBLP]


  47. Towards Practical Privacy for Genomic Computation. [Citation Graph (, )][DBLP]


  48. De-anonymizing Social Networks. [Citation Graph (, )][DBLP]


  49. Measuring relationship anonymity in mix networks. [Citation Graph (, )][DBLP]


  50. Myths and fallacies of "personally identifiable information". [Citation Graph (, )][DBLP]


  51. De-anonymizing Social Networks [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002