dblp.uni-trier.dewww.uni-trier.de

Anupam Datta

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
20EERalf Küsters, Anupam Datta, John C. Mitchell, Ajith Ramanathan: On the Relationships between Notions of Simulation-Based Security. J. Cryptology 21(4): 492-546 (2008)
2007
19EEAdam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram: Privacy and Utility in Business Processes. CSF 2007: 279-294
18EEArnab Roy, Anupam Datta, Ante Derek, John C. Mitchell: Inductive Proofs of Computational Secrecy. ESORICS 2007: 219-234
17EEArnab Roy, Anupam Datta, John C. Mitchell: Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. TGC 2007: 312-329
16EEAnupam Datta, Ante Derek, John C. Mitchell, Arnab Roy: Protocol Composition Logic (PCL). Electr. Notes Theor. Comput. Sci. 172: 311-358 (2007)
2006
15EEArnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert: Secrecy Analysis in Protocol Composition Logic. ASIAN 2006: 197-213
14EEAnupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi: Computationally Sound Compositional Logic for Key Exchange Protocols. CSFW 2006: 321-334
13EEAdam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum: Privacy and Contextual Integrity: Framework and Applications. IEEE Symposium on Security and Privacy 2006: 184-198
12EEAnupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov: Games and the Impossibility of Realizable Ideal Functionality. TCC 2006: 360-379
11EEMichael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani: Compositional analysis of contract-signing protocols. Theor. Comput. Sci. 367(1-2): 33-56 (2006)
2005
10EEChanghua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell: A modular correctness proof of IEEE 802.11i and TLS. ACM Conference on Computer and Communications Security 2005: 2-15
9EEMichael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani: Compositional Analysis of Contract Signing Protocols. CSFW 2005: 94-110
8EEAnupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani: Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. ICALP 2005: 16-29
7EEAnupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan: On the Relationships Between Notions of Simulation-Based Security. TCC 2005: 476-494
6EEAnupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic: A derivation system and compositional logic for security protocols. Journal of Computer Security 13(3): 423-482 (2005)
2004
5EEAnupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic: Abstraction and Refinement in Protocol Derivation. CSFW 2004: 30-
2003
4EEAnupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic: A Derivation System for Security Protocols and its Logical Formalization. CSFW 2003: 109-125
3EEAnupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic: Secure protocol composition. FMSE 2003: 11-23
2002
2EEAnupam Datta, Sidharth Choudhury, Anupam Basu: Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks. VLSI Design 2002: 705-710
2001
1EEAnupam Datta, Sidharth Choudhury, Anupam Basu, Hiroyuki Tomiyama, Nikil Dutt: Satisfying Timing Constraints of Preemptive Real-Time Tasks through Task Layout Technique. VLSI Design 2001: 97-102

Coauthor Index

1Michael Backes [9] [11]
2Adam Barth [13] [19]
3Anupam Basu [1] [2]
4Sidharth Choudhury [1] [2]
5Ante Derek [3] [4] [5] [6] [8] [9] [10] [11] [12] [14] [15] [16] [18]
6Nikil D. Dutt (Nikil Dutt) [1]
7Changhua He [10]
8Ralf Küsters [7] [20]
9John C. Mitchell [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20]
10Helen Nissenbaum [13]
11Dusko Pavlovic [3] [4] [5] [6]
12Ajith Ramanathan [7] [12] [20]
13Arnab Roy [15] [16] [17] [18]
14Andre Scedrov [12]
15Jean-Pierre Seifert [15]
16Vitaly Shmatikov [8]
17Sharada Sundaram [19]
18Mukund Sundararajan [10]
19Hiroyuki Tomiyama [1]
20Mathieu Turuani [8] [9] [11]
21Bogdan Warinschi [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)