|
Search the dblp DataBase
Vitaly Shmatikov:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Justin Brickell, Vitaly Shmatikov
Privacy-Preserving Graph Algorithms in the Semi-honest Model. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:236-252 [Conf]
- Prateek Gupta, Vitaly Shmatikov
Towards computationally sound symbolic analysis of key exchange protocols. [Citation Graph (0, 0)][DBLP] FMSE, 2005, pp:23-32 [Conf]
- Jonathan K. Millen, Vitaly Shmatikov
Constraint solving for bounded-process cryptographic protocol analysis. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2001, pp:166-175 [Conf]
- Arvind Narayanan, Vitaly Shmatikov
Obfuscated databases and group privacy. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:102-111 [Conf]
- Arvind Narayanan, Vitaly Shmatikov
Fast dictionary attacks on passwords using time-space tradeoff. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:364-372 [Conf]
- Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov
Contract Signing, Optimism, and Advantage. [Citation Graph (0, 0)][DBLP] CONCUR, 2003, pp:361-377 [Conf]
- Jonathan K. Millen, Vitaly Shmatikov
Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:47-61 [Conf]
- Vitaly Shmatikov, Ulrich Stern
Efficient Finite-State Analysis for Large Security Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 1998, pp:106-115 [Conf]
- Ajay Mahimkar, Vitaly Shmatikov
Game-Based Analysis of Denial-of-Service Prevention Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:287-301 [Conf]
- Vitaly Shmatikov
Probabilistic Analysis of Anonymity. [Citation Graph (0, 0)][DBLP] CSFW, 2002, pp:119-128 [Conf]
- Viviana Bono, Amit Patel, Vitaly Shmatikov
A Core Calculus of Classes and Mixins. [Citation Graph (0, 0)][DBLP] ECOOP, 1999, pp:43-66 [Conf]
- Vitaly Shmatikov
Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation. [Citation Graph (0, 0)][DBLP] ESOP, 2004, pp:355-369 [Conf]
- Vitaly Shmatikov, Ming-Hsiu Wang
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:18-33 [Conf]
- Stanislaw Jarecki, Vitaly Shmatikov
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:590-608 [Conf]
- Gethin Norman, Vitaly Shmatikov
Analysis of Probabilistic Contract Signing. [Citation Graph (0, 0)][DBLP] FASec, 2002, pp:81-96 [Conf]
- Stanislaw Jarecki, Vitaly Shmatikov
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:172-187 [Conf]
- Vitaly Shmatikov, John C. Mitchell
Analysis of Abuse-Free Contract Signing. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2000, pp:174-191 [Conf]
- Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. [Citation Graph (0, 0)][DBLP] ICALP, 2005, pp:16-29 [Conf]
- Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov
Negotiated Privacy: (Extended Abstract). [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:96-111 [Conf]
- Justin Brickell, Vitaly Shmatikov
Efficient anonymity-preserving data collection. [Citation Graph (0, 0)][DBLP] KDD, 2006, pp:76-85 [Conf]
- Hubert Comon-Lundh, Vitaly Shmatikov
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or. [Citation Graph (0, 0)][DBLP] LICS, 2003, pp:271-0 [Conf]
- Vitaly Shmatikov, John C. Mitchell
Analysis of a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP] NDSS, 2000, pp:- [Conf]
- Roger Dingledine, Vitaly Shmatikov, Paul F. Syverson
Synchronous Batching: From Cascades to Free Routes. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2004, pp:186-206 [Conf]
- Patrick Lincoln, Phillip A. Porras, Vitaly Shmatikov
Privacy-Preserving Sharing and Correlation of Security Alerts. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:239-254 [Conf]
- Viviana Bono, John C. Mitchell, Amit Patel, Vitaly Shmatikov
A Core Calculus of Classes and Objects. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 1999, v:20, n:, pp:- [Journal]
- Dominic Hughes, Vitaly Shmatikov
Information Hiding, Anonymity and Privacy: a Modular Approach. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:1, pp:3-36 [Journal]
- Jonathan K. Millen, Vitaly Shmatikov
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:515-564 [Journal]
- Jonathan K. Millen, Vitaly Shmatikov
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:4, pp:695-0 [Journal]
- Vitaly Shmatikov
Probabilistic analysis of an anonymity system. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:355-377 [Journal]
- Vitaly Shmatikov, Carolyn L. Talcott
Reputation-based trust management. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:1, pp:167-190 [Journal]
- Gethin Norman, Vitaly Shmatikov
Analysis of probabilistic contract signing. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2006, v:14, n:6, pp:561-589 [Journal]
- Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov
Contract signing, optimism, and advantage. [Citation Graph (0, 0)][DBLP] J. Log. Algebr. Program., 2005, v:64, n:2, pp:189-218 [Journal]
- Vitaly Shmatikov, John C. Mitchell
Finite-state analysis of two contract signing protocols. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2002, v:283, n:2, pp:419-450 [Journal]
- Vitaly Shmatikov, Ming-Hsiu Wang
Secure Verification of Location Claims with Simultaneous Distance Modification. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:181-195 [Conf]
- Stanislaw Jarecki, Vitaly Shmatikov
Efficient Two-Party Secure Computation on Committed Inputs. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2007, pp:97-114 [Conf]
- Ajay Mahimkar, Jasraj Dange, Vitaly Shmatikov, Harrick M. Vin, Yin Zhang
dFence: Transparent Network-based Denial of Service Mitigation. [Citation Graph (0, 0)][DBLP] NSDI, 2007, pp:- [Conf]
- Phillip A. Porras, Vitaly Shmatikov
Large-scale collection and sanitization of network security data: risks and challenges. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:57-64 [Conf]
- Edmund L. Wong, Praveen Balasubramanian, Lorenzo Alvisi, Mohamed G. Gouda, Vitaly Shmatikov
Truth in advertising: lightweight verification of route integrity. [Citation Graph (0, 0)][DBLP] PODC, 2007, pp:147-156 [Conf]
- Arvind Narayanan, Vitaly Shmatikov
How To Break Anonymity of the Netflix Prize Dataset [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
Privacy-preserving remote diagnostics. [Citation Graph (, )][DBLP]
Security Analysis of Voice-over-IP Protocols. [Citation Graph (, )][DBLP]
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities. [Citation Graph (, )][DBLP]
Privacy-Preserving Classifier Learning. [Citation Graph (, )][DBLP]
The cost of privacy: destruction of data-mining utility in anonymized data publishing. [Citation Graph (, )][DBLP]
Airavat: Security and Privacy for MapReduce. [Citation Graph (, )][DBLP]
Robust De-anonymization of Large Sparse Datasets. [Citation Graph (, )][DBLP]
Towards Practical Privacy for Genomic Computation. [Citation Graph (, )][DBLP]
De-anonymizing Social Networks. [Citation Graph (, )][DBLP]
Measuring relationship anonymity in mix networks. [Citation Graph (, )][DBLP]
Myths and fallacies of "personally identifiable information". [Citation Graph (, )][DBLP]
De-anonymizing Social Networks [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.307secs
|