Search the dblp DataBase
Anupam Datta :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Anupam Datta , Sidharth Choudhury , Anupam Basu Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks. [Citation Graph (0, 0)][DBLP ] ASP-DAC, 2002, pp:705-710 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Dusko Pavlovic Secure protocol composition. [Citation Graph (0, 0)][DBLP ] FMSE, 2003, pp:11-23 [Conf ] Changhua He , Mukund Sundararajan , Anupam Datta , Ante Derek , John C. Mitchell A modular correctness proof of IEEE 802.11i and TLS. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:2-15 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Dusko Pavlovic A Derivation System for Security Protocols and its Logical Formalization. [Citation Graph (0, 0)][DBLP ] CSFW, 2003, pp:109-125 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Dusko Pavlovic Abstraction and Refinement in Protocol Derivation. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:30-0 [Conf ] Michael Backes , Anupam Datta , Ante Derek , John C. Mitchell , Mathieu Turuani Compositional Analysis of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:94-110 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Bogdan Warinschi Computationally Sound Compositional Logic for Key Exchange Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:321-334 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Vitaly Shmatikov , Mathieu Turuani Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. [Citation Graph (0, 0)][DBLP ] ICALP, 2005, pp:16-29 [Conf ] Adam Barth , Anupam Datta , John C. Mitchell , Helen Nissenbaum Privacy and Contextual Integrity: Framework and Applications. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:184-198 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Ajith Ramanathan , Andre Scedrov Games and the Impossibility of Realizable Ideal Functionality. [Citation Graph (0, 0)][DBLP ] TCC, 2006, pp:360-379 [Conf ] Anupam Datta , Ralf Küsters , John C. Mitchell , Ajith Ramanathan On the Relationships Between Notions of Simulation-Based Security. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:476-494 [Conf ] Anupam Datta , Sidharth Choudhury , Anupam Basu Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks. [Citation Graph (0, 0)][DBLP ] VLSI Design, 2002, pp:705-710 [Conf ] Anupam Datta , Sidharth Choudhury , Anupam Basu , Hiroyuki Tomiyama , Nikil Dutt Satisfying Timing Constraints of Preemptive Real-Time Tasks through Task Layout Technique. [Citation Graph (0, 0)][DBLP ] VLSI Design, 2001, pp:97-102 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Arnab Roy Protocol Composition Logic (PCL). [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:172, n:, pp:311-358 [Journal ] Anupam Datta , Ante Derek , John C. Mitchell , Dusko Pavlovic A derivation system and compositional logic for security protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:3, pp:423-482 [Journal ] Michael Backes , Anupam Datta , Ante Derek , John C. Mitchell , Mathieu Turuani Compositional analysis of contract-signing protocols. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:367, n:1-2, pp:33-56 [Journal ] Arnab Roy , Anupam Datta , Ante Derek , John C. Mitchell Inductive Proofs of Computational Secrecy. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:219-234 [Conf ] Secrecy Analysis in Protocol Composition Logic. [Citation Graph (, )][DBLP ] Privacy and Utility in Business Processes. [Citation Graph (, )][DBLP ] ASPIER: An Automated Framework for Verifying Security Protocol Implementations. [Citation Graph (, )][DBLP ] Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size. [Citation Graph (, )][DBLP ] A Logic of Secure Systems and its Application to Trusted Computing. [Citation Graph (, )][DBLP ] TrustVisor: Efficient TCB Reduction and Attestation. [Citation Graph (, )][DBLP ] Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. [Citation Graph (, )][DBLP ] Distributed programming with distributed authorization. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.303secs