Anupam Datta
Anupam Datta
Professor, Electrical and Computer Engineering & Computer Science Departments, CMU
Verified email at cmu.edu - Homepage
Title
Cited by
Cited by
Year
TrustVisor: Efficient TCB reduction and attestation
JM McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig
2010 IEEE Symposium on Security and Privacy, 143-158, 2010
6792010
Automated experiments on ad privacy settings: A tale of opacity, choice, and discrimination
A Datta, MC Tschantz, A Datta
Proceedings on privacy enhancing technologies 2015 (1), 92-112, 2015
5012015
Privacy and contextual integrity: Framework and applications
A Barth, A Datta, JC Mitchell, H Nissenbaum
2006 IEEE symposium on security and privacy (S&P'06), 15 pp.-198, 2006
4812006
Algorithmic transparency via quantitative input influence: Theory and experiments with learning systems
A Datta, S Sen, Y Zick
2016 IEEE symposium on security and privacy (SP), 598-617, 2016
3972016
Protocol composition logic (PCL)
A Datta, A Derek, JC Mitchell, A Roy
Electronic Notes in Theoretical Computer Science 172, 311-358, 2007
2682007
A derivation system and compositional logic for security protocols
A Datta, A Derek, JC Mitchell, D Pavlovic
Journal of Computer Security 13 (3), 423-482, 2005
1892005
A modular correctness proof of IEEE 802.11 i and TLS
C He, M Sundararajan, A Datta, A Derek, JC Mitchell
Proceedings of the 12th ACM conference on Computer and communications …, 2005
1622005
The johnson-lindenstrauss transform itself preserves differential privacy
J Blocki, A Blum, A Datta, O Sheffet
2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 410-419, 2012
1402012
A logic of secure systems and its application to trusted computing
A Datta, J Franklin, D Garg, D Kaynar
2009 30th IEEE Symposium on Security and Privacy, 221-236, 2009
1352009
Differentially private data analysis of social networks via restricted sensitivity
J Blocki, A Blum, A Datta, O Sheffet
Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013
1322013
Optimization of cellulase production from bacteria isolated from soil
S Sethi, A Datta, BL Gupta, S Gupta
International Scholarly Research Notices 2013, 2013
1302013
Privacy and utility in business processes
A Barth, J Mitchell, A Datta, S Sundaram
20th IEEE Computer Security Foundations Symposium (CSF'07), 279-294, 2007
1292007
Design, implementation and verification of an extensible and modular hypervisor framework
A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta
2013 IEEE Symposium on Security and Privacy, 430-444, 2013
1262013
Probabilistic polynomial-time semantics for a protocol security logic
A Datta, A Derek, JC Mitchell, V Shmatikov, M Turuani
International Colloquium on Automata, Languages, and Programming, 16-29, 2005
1262005
Policy auditing over incomplete logs: theory, implementation and applications
D Garg, L Jia, A Datta
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1252011
Large-scale vehicle detection, indexing, and search in urban surveillance videos
RS Feris, B Siddiquie, J Petterson, Y Zhai, A Datta, LM Brown, S Pankanti
IEEE Transactions on Multimedia 14 (1), 28-42, 2011
1102011
Experiences in the logical specification of the HIPAA and GLBA privacy laws
H DeYoung, D Garg, L Jia, D Kaynar, A Datta
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
1082010
Flow distribution in parallel and reverse flow manifolds
AB Datta, AK Majumdar
International Journal of Heat and Fluid Flow 2 (4), 253-262, 1980
1071980
Secure protocol composition
A Datta, A Derek, JC Mitchell, D Pavlovic
Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003
1032003
A derivation system for security protocols and its logical formalization
A Datta, A Derek, JC Mitchell, D Pavlovic
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 109-125, 2003
1012003
The system can't perform the operation now. Try again later.
Articles 1–20