| 2008 |
| 20 | EE | Ralf Küsters,
Anupam Datta,
John C. Mitchell,
Ajith Ramanathan:
On the Relationships between Notions of Simulation-Based Security.
J. Cryptology 21(4): 492-546 (2008) |
| 2007 |
| 19 | EE | Adam Barth,
John C. Mitchell,
Anupam Datta,
Sharada Sundaram:
Privacy and Utility in Business Processes.
CSF 2007: 279-294 |
| 18 | EE | Arnab Roy,
Anupam Datta,
Ante Derek,
John C. Mitchell:
Inductive Proofs of Computational Secrecy.
ESORICS 2007: 219-234 |
| 17 | EE | Arnab Roy,
Anupam Datta,
John C. Mitchell:
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols.
TGC 2007: 312-329 |
| 16 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Arnab Roy:
Protocol Composition Logic (PCL).
Electr. Notes Theor. Comput. Sci. 172: 311-358 (2007) |
| 2006 |
| 15 | EE | Arnab Roy,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Jean-Pierre Seifert:
Secrecy Analysis in Protocol Composition Logic.
ASIAN 2006: 197-213 |
| 14 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Bogdan Warinschi:
Computationally Sound Compositional Logic for Key Exchange Protocols.
CSFW 2006: 321-334 |
| 13 | EE | Adam Barth,
Anupam Datta,
John C. Mitchell,
Helen Nissenbaum:
Privacy and Contextual Integrity: Framework and Applications.
IEEE Symposium on Security and Privacy 2006: 184-198 |
| 12 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Ajith Ramanathan,
Andre Scedrov:
Games and the Impossibility of Realizable Ideal Functionality.
TCC 2006: 360-379 |
| 11 | EE | Michael Backes,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Mathieu Turuani:
Compositional analysis of contract-signing protocols.
Theor. Comput. Sci. 367(1-2): 33-56 (2006) |
| 2005 |
| 10 | EE | Changhua He,
Mukund Sundararajan,
Anupam Datta,
Ante Derek,
John C. Mitchell:
A modular correctness proof of IEEE 802.11i and TLS.
ACM Conference on Computer and Communications Security 2005: 2-15 |
| 9 | EE | Michael Backes,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Mathieu Turuani:
Compositional Analysis of Contract Signing Protocols.
CSFW 2005: 94-110 |
| 8 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Vitaly Shmatikov,
Mathieu Turuani:
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic.
ICALP 2005: 16-29 |
| 7 | EE | Anupam Datta,
Ralf Küsters,
John C. Mitchell,
Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security.
TCC 2005: 476-494 |
| 6 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
A derivation system and compositional logic for security protocols.
Journal of Computer Security 13(3): 423-482 (2005) |
| 2004 |
| 5 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
Abstraction and Refinement in Protocol Derivation.
CSFW 2004: 30- |
| 2003 |
| 4 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
A Derivation System for Security Protocols and its Logical Formalization.
CSFW 2003: 109-125 |
| 3 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
Secure protocol composition.
FMSE 2003: 11-23 |
| 2002 |
| 2 | EE | Anupam Datta,
Sidharth Choudhury,
Anupam Basu:
Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks.
VLSI Design 2002: 705-710 |
| 2001 |
| 1 | EE | Anupam Datta,
Sidharth Choudhury,
Anupam Basu,
Hiroyuki Tomiyama,
Nikil Dutt:
Satisfying Timing Constraints of Preemptive Real-Time Tasks through Task Layout Technique.
VLSI Design 2001: 97-102 |