2008 |
20 | EE | Ralf Küsters,
Anupam Datta,
John C. Mitchell,
Ajith Ramanathan:
On the Relationships between Notions of Simulation-Based Security.
J. Cryptology 21(4): 492-546 (2008) |
2007 |
19 | EE | Adam Barth,
John C. Mitchell,
Anupam Datta,
Sharada Sundaram:
Privacy and Utility in Business Processes.
CSF 2007: 279-294 |
18 | EE | Arnab Roy,
Anupam Datta,
Ante Derek,
John C. Mitchell:
Inductive Proofs of Computational Secrecy.
ESORICS 2007: 219-234 |
17 | EE | Arnab Roy,
Anupam Datta,
John C. Mitchell:
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols.
TGC 2007: 312-329 |
16 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Arnab Roy:
Protocol Composition Logic (PCL).
Electr. Notes Theor. Comput. Sci. 172: 311-358 (2007) |
2006 |
15 | EE | Arnab Roy,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Jean-Pierre Seifert:
Secrecy Analysis in Protocol Composition Logic.
ASIAN 2006: 197-213 |
14 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Bogdan Warinschi:
Computationally Sound Compositional Logic for Key Exchange Protocols.
CSFW 2006: 321-334 |
13 | EE | Adam Barth,
Anupam Datta,
John C. Mitchell,
Helen Nissenbaum:
Privacy and Contextual Integrity: Framework and Applications.
IEEE Symposium on Security and Privacy 2006: 184-198 |
12 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Ajith Ramanathan,
Andre Scedrov:
Games and the Impossibility of Realizable Ideal Functionality.
TCC 2006: 360-379 |
11 | EE | Michael Backes,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Mathieu Turuani:
Compositional analysis of contract-signing protocols.
Theor. Comput. Sci. 367(1-2): 33-56 (2006) |
2005 |
10 | EE | Changhua He,
Mukund Sundararajan,
Anupam Datta,
Ante Derek,
John C. Mitchell:
A modular correctness proof of IEEE 802.11i and TLS.
ACM Conference on Computer and Communications Security 2005: 2-15 |
9 | EE | Michael Backes,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Mathieu Turuani:
Compositional Analysis of Contract Signing Protocols.
CSFW 2005: 94-110 |
8 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Vitaly Shmatikov,
Mathieu Turuani:
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic.
ICALP 2005: 16-29 |
7 | EE | Anupam Datta,
Ralf Küsters,
John C. Mitchell,
Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security.
TCC 2005: 476-494 |
6 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
A derivation system and compositional logic for security protocols.
Journal of Computer Security 13(3): 423-482 (2005) |
2004 |
5 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
Abstraction and Refinement in Protocol Derivation.
CSFW 2004: 30- |
2003 |
4 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
A Derivation System for Security Protocols and its Logical Formalization.
CSFW 2003: 109-125 |
3 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
Secure protocol composition.
FMSE 2003: 11-23 |
2002 |
2 | EE | Anupam Datta,
Sidharth Choudhury,
Anupam Basu:
Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks.
VLSI Design 2002: 705-710 |
2001 |
1 | EE | Anupam Datta,
Sidharth Choudhury,
Anupam Basu,
Hiroyuki Tomiyama,
Nikil Dutt:
Satisfying Timing Constraints of Preemptive Real-Time Tasks through Task Layout Technique.
VLSI Design 2001: 97-102 |