2009 |
47 | EE | Arvind Narayanan,
Vitaly Shmatikov:
De-anonymizing Social Networks
CoRR abs/0903.3276: (2009) |
2008 |
46 | | Vitaly Shmatikov:
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008
ACM 2008 |
45 | EE | Arvind Narayanan,
Vitaly Shmatikov:
Robust De-anonymization of Large Sparse Datasets.
IEEE Symposium on Security and Privacy 2008: 111-125 |
44 | EE | Somesh Jha,
Louis Kruger,
Vitaly Shmatikov:
Towards Practical Privacy for Genomic Computation.
IEEE Symposium on Security and Privacy 2008: 216-230 |
43 | EE | Justin Brickell,
Vitaly Shmatikov:
The cost of privacy: destruction of data-mining utility in anonymized data publishing.
KDD 2008: 70-78 |
2007 |
42 | EE | Justin Brickell,
Donald E. Porter,
Vitaly Shmatikov,
Emmett Witchel:
Privacy-preserving remote diagnostics.
ACM Conference on Computer and Communications Security 2007: 498-507 |
41 | EE | Vitaly Shmatikov,
Ming-Hsiu Wang:
Secure Verification of Location Claims with Simultaneous Distance Modification.
ASIAN 2007: 181-195 |
40 | EE | Prateek Gupta,
Vitaly Shmatikov:
Security Analysis of Voice-over-IP Protocols.
CSF 2007: 49-63 |
39 | EE | Stanislaw Jarecki,
Vitaly Shmatikov:
Efficient Two-Party Secure Computation on Committed Inputs.
EUROCRYPT 2007: 97-114 |
38 | EE | Ajay Mahimkar,
Jasraj Dange,
Vitaly Shmatikov,
Harrick M. Vin,
Yin Zhang:
dFence: Transparent Network-based Denial of Service Mitigation.
NSDI 2007 |
37 | EE | Edmund L. Wong,
Praveen Balasubramanian,
Lorenzo Alvisi,
Mohamed G. Gouda,
Vitaly Shmatikov:
Truth in advertising: lightweight verification of route integrity.
PODC 2007: 147-156 |
2006 |
36 | EE | Vitaly Shmatikov,
Ming-Hsiu Wang:
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses.
ESORICS 2006: 18-33 |
35 | EE | Justin Brickell,
Vitaly Shmatikov:
Efficient anonymity-preserving data collection.
KDD 2006: 76-85 |
34 | EE | Phillip A. Porras,
Vitaly Shmatikov:
Large-scale collection and sanitization of network security data: risks and challenges.
NSPW 2006: 57-64 |
33 | EE | Vitaly Shmatikov,
Ming-Hsiu Wang:
Measuring relationship anonymity in mix networks.
WPES 2006: 59-62 |
32 | EE | Arvind Narayanan,
Vitaly Shmatikov:
How To Break Anonymity of the Netflix Prize Dataset
CoRR abs/cs/0610105: (2006) |
31 | EE | Gethin Norman,
Vitaly Shmatikov:
Analysis of probabilistic contract signing.
Journal of Computer Security 14(6): 561-589 (2006) |
2005 |
30 | EE | Arvind Narayanan,
Vitaly Shmatikov:
Obfuscated databases and group privacy.
ACM Conference on Computer and Communications Security 2005: 102-111 |
29 | EE | Arvind Narayanan,
Vitaly Shmatikov:
Fast dictionary attacks on passwords using time-space tradeoff.
ACM Conference on Computer and Communications Security 2005: 364-372 |
28 | EE | Justin Brickell,
Vitaly Shmatikov:
Privacy-Preserving Graph Algorithms in the Semi-honest Model.
ASIACRYPT 2005: 236-252 |
27 | EE | Ajay Mahimkar,
Vitaly Shmatikov:
Game-Based Analysis of Denial-of-Service Prevention Protocols.
CSFW 2005: 287-301 |
26 | EE | Prateek Gupta,
Vitaly Shmatikov:
Towards computationally sound symbolic analysis of key exchange protocols.
FMSE 2005: 23-32 |
25 | EE | Stanislaw Jarecki,
Vitaly Shmatikov:
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure.
Financial Cryptography 2005: 172-187 |
24 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Vitaly Shmatikov,
Mathieu Turuani:
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic.
ICALP 2005: 16-29 |
23 | EE | Rohit Chadha,
John C. Mitchell,
Andre Scedrov,
Vitaly Shmatikov:
Contract signing, optimism, and advantage.
J. Log. Algebr. Program. 64(2): 189-218 (2005) |
22 | | Vitaly Shmatikov,
Carolyn L. Talcott:
Reputation-based trust management.
Journal of Computer Security 13(1): 167-190 (2005) |
21 | EE | Jonathan K. Millen,
Vitaly Shmatikov:
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation.
Journal of Computer Security 13(3): 515-564 (2005) |
20 | EE | Jonathan K. Millen,
Vitaly Shmatikov:
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation.
Journal of Computer Security 13(4): 695- (2005) |
2004 |
19 | EE | Vitaly Shmatikov:
Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation.
ESOP 2004: 355-369 |
18 | EE | Stanislaw Jarecki,
Vitaly Shmatikov:
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme.
EUROCRYPT 2004: 590-608 |
17 | EE | Roger Dingledine,
Vitaly Shmatikov,
Paul F. Syverson:
Synchronous Batching: From Cascades to Free Routes.
Privacy Enhancing Technologies 2004: 186-206 |
16 | EE | Patrick Lincoln,
Phillip A. Porras,
Vitaly Shmatikov:
Privacy-Preserving Sharing and Correlation of Security Alerts.
USENIX Security Symposium 2004: 239-254 |
15 | | Dominic Hughes,
Vitaly Shmatikov:
Information Hiding, Anonymity and Privacy: a Modular Approach.
Journal of Computer Security 12(1): 3-36 (2004) |
14 | | Vitaly Shmatikov:
Probabilistic analysis of an anonymity system.
Journal of Computer Security 12(3-4): 355-377 (2004) |
2003 |
13 | EE | Rohit Chadha,
John C. Mitchell,
Andre Scedrov,
Vitaly Shmatikov:
Contract Signing, Optimism, and Advantage.
CONCUR 2003: 361-377 |
12 | EE | Jonathan K. Millen,
Vitaly Shmatikov:
Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation.
CSFW 2003: 47-61 |
11 | EE | Hubert Comon-Lundh,
Vitaly Shmatikov:
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or.
LICS 2003: 271- |
2002 |
10 | EE | Vitaly Shmatikov:
Probabilistic Analysis of Anonymity.
CSFW 2002: 119-128 |
9 | EE | Gethin Norman,
Vitaly Shmatikov:
Analysis of Probabilistic Contract Signing.
FASec 2002: 81-96 |
8 | EE | Stanislaw Jarecki,
Patrick Lincoln,
Vitaly Shmatikov:
Negotiated Privacy: (Extended Abstract).
ISSS 2002: 96-111 |
7 | EE | Vitaly Shmatikov,
John C. Mitchell:
Finite-state analysis of two contract signing protocols.
Theor. Comput. Sci. 283(2): 419-450 (2002) |
2001 |
6 | EE | Jonathan K. Millen,
Vitaly Shmatikov:
Constraint solving for bounded-process cryptographic protocol analysis.
ACM Conference on Computer and Communications Security 2001: 166-175 |
2000 |
5 | EE | Vitaly Shmatikov,
John C. Mitchell:
Analysis of Abuse-Free Contract Signing.
Financial Cryptography 2000: 174-191 |
4 | EE | Vitaly Shmatikov,
John C. Mitchell:
Analysis of a Fair Exchange Protocol.
NDSS 2000 |
1999 |
3 | EE | Viviana Bono,
Amit Patel,
Vitaly Shmatikov:
A Core Calculus of Classes and Mixins.
ECOOP 1999: 43-66 |
2 | EE | Viviana Bono,
John C. Mitchell,
Amit Patel,
Vitaly Shmatikov:
A Core Calculus of Classes and Objects.
Electr. Notes Theor. Comput. Sci. 20: (1999) |
1998 |
1 | EE | Vitaly Shmatikov,
Ulrich Stern:
Efficient Finite-State Analysis for Large Security Protocols.
CSFW 1998: 106-115 |