The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ante Derek: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    Secure protocol composition. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:11-23 [Conf]
  2. Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell
    A modular correctness proof of IEEE 802.11i and TLS. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:2-15 [Conf]
  3. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    A Derivation System for Security Protocols and its Logical Formalization. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:109-125 [Conf]
  4. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    Abstraction and Refinement in Protocol Derivation. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:30-0 [Conf]
  5. Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
    Compositional Analysis of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:94-110 [Conf]
  6. Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi
    Computationally Sound Compositional Logic for Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:321-334 [Conf]
  7. Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani
    Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:16-29 [Conf]
  8. Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
    Games and the Impossibility of Realizable Ideal Functionality. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:360-379 [Conf]
  9. Anupam Datta, Ante Derek, John C. Mitchell, Arnab Roy
    Protocol Composition Logic (PCL). [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:172, n:, pp:311-358 [Journal]
  10. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    A derivation system and compositional logic for security protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:3, pp:423-482 [Journal]
  11. Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
    Compositional analysis of contract-signing protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:33-56 [Journal]
  12. Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
    Inductive Proofs of Computational Secrecy. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:219-234 [Conf]

  13. Secrecy Analysis in Protocol Composition Logic. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002