|
Search the dblp DataBase
Ante Derek:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
Secure protocol composition. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:11-23 [Conf]
- Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell
A modular correctness proof of IEEE 802.11i and TLS. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:2-15 [Conf]
- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
A Derivation System for Security Protocols and its Logical Formalization. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:109-125 [Conf]
- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
Abstraction and Refinement in Protocol Derivation. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:30-0 [Conf]
- Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
Compositional Analysis of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:94-110 [Conf]
- Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi
Computationally Sound Compositional Logic for Key Exchange Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2006, pp:321-334 [Conf]
- Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. [Citation Graph (0, 0)][DBLP] ICALP, 2005, pp:16-29 [Conf]
- Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
Games and the Impossibility of Realizable Ideal Functionality. [Citation Graph (0, 0)][DBLP] TCC, 2006, pp:360-379 [Conf]
- Anupam Datta, Ante Derek, John C. Mitchell, Arnab Roy
Protocol Composition Logic (PCL). [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:172, n:, pp:311-358 [Journal]
- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
A derivation system and compositional logic for security protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:423-482 [Journal]
- Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
Compositional analysis of contract-signing protocols. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2006, v:367, n:1-2, pp:33-56 [Journal]
- Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
Inductive Proofs of Computational Secrecy. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:219-234 [Conf]
Secrecy Analysis in Protocol Composition Logic. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.007secs
|