The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Anupam Datta: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Anupam Datta, Sidharth Choudhury, Anupam Basu
    Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2002, pp:705-710 [Conf]
  2. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    Secure protocol composition. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:11-23 [Conf]
  3. Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell
    A modular correctness proof of IEEE 802.11i and TLS. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:2-15 [Conf]
  4. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    A Derivation System for Security Protocols and its Logical Formalization. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:109-125 [Conf]
  5. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    Abstraction and Refinement in Protocol Derivation. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:30-0 [Conf]
  6. Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
    Compositional Analysis of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:94-110 [Conf]
  7. Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi
    Computationally Sound Compositional Logic for Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:321-334 [Conf]
  8. Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani
    Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:16-29 [Conf]
  9. Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum
    Privacy and Contextual Integrity: Framework and Applications. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:184-198 [Conf]
  10. Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
    Games and the Impossibility of Realizable Ideal Functionality. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:360-379 [Conf]
  11. Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan
    On the Relationships Between Notions of Simulation-Based Security. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:476-494 [Conf]
  12. Anupam Datta, Sidharth Choudhury, Anupam Basu
    Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks. [Citation Graph (0, 0)][DBLP]
    VLSI Design, 2002, pp:705-710 [Conf]
  13. Anupam Datta, Sidharth Choudhury, Anupam Basu, Hiroyuki Tomiyama, Nikil Dutt
    Satisfying Timing Constraints of Preemptive Real-Time Tasks through Task Layout Technique. [Citation Graph (0, 0)][DBLP]
    VLSI Design, 2001, pp:97-102 [Conf]
  14. Anupam Datta, Ante Derek, John C. Mitchell, Arnab Roy
    Protocol Composition Logic (PCL). [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:172, n:, pp:311-358 [Journal]
  15. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    A derivation system and compositional logic for security protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:3, pp:423-482 [Journal]
  16. Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
    Compositional analysis of contract-signing protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:33-56 [Journal]
  17. Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
    Inductive Proofs of Computational Secrecy. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:219-234 [Conf]

  18. Secrecy Analysis in Protocol Composition Logic. [Citation Graph (, )][DBLP]


  19. Privacy and Utility in Business Processes. [Citation Graph (, )][DBLP]


  20. ASPIER: An Automated Framework for Verifying Security Protocol Implementations. [Citation Graph (, )][DBLP]


  21. Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size. [Citation Graph (, )][DBLP]


  22. A Logic of Secure Systems and its Application to Trusted Computing. [Citation Graph (, )][DBLP]


  23. TrustVisor: Efficient TCB Reduction and Attestation. [Citation Graph (, )][DBLP]


  24. Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. [Citation Graph (, )][DBLP]


  25. Distributed programming with distributed authorization. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.303secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002