Anupam Datta

According to our database1, Anupam Datta
  • authored at least 109 papers between 2001 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Discrimination in Online Personalization: A Multidisciplinary Inquiry.
Proceedings of the Conference on Fairness, Accountability and Transparency, 2018

2017
Latent Factor Interpretations for Collaborative Filtering.
CoRR, 2017

Differential Privacy as a Causal Property.
CoRR, 2017

Proxy Non-Discrimination in Data-Driven Systems.
CoRR, 2017

Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs.
CoRR, 2017

Towards Human Computable Passwords.
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Differentially Private Password Frequency Lists.
IACR Cryptology ePrint Archive, 2016

Information Flow for Security in Control Systems.
CoRR, 2016

Report on the NSF Workshop on Formal Methods for Security.
CoRR, 2016

überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor.
Proceedings of the 25th USENIX Security Symposium, 2016

Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Differentially Private Password Frequency Lists.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Accountability in cyber-physical systems.
Proceedings of the 2016 Science of Security for Cyber-Physical Systems Workshop, 2016

Information flow for security in control systems.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
Automated Experiments on Ad Privacy Settings.
PoPETs, 2015

Naturally Rehearsing Passwords.
IACR Cryptology ePrint Archive, 2015

System M: A Program Logic for Code Sandboxing and Identification.
CoRR, 2015

A Symbolic Logic with Concrete Bounds for Cryptographic Protocols.
CoRR, 2015

Influence in Classification via Cooperative Game Theory.
CoRR, 2015

Program Actions as Actual Causes: A Building Block for Accountability.
CoRR, 2015

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
CoRR, 2015

CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection.
CoRR, 2015

A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System.
Proceedings of the Runtime Verification - 6th International Conference, 2015

Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Influence in Classification via Cooperative Game Theory.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Incentivizing Peer Grading in MOOCS: An Audit Game Approach.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

A Methodology for Information Flow Experiments.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

A Logic of Programs with Interface-Confined Code.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Program Actions as Actual Causes: A Building Block for Accountability.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Audit Games with Multiple Defender Resources.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
A Methodology for Information Flow Experiments.
CoRR, 2014

Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination.
CoRR, 2014

Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords.
CoRR, 2014

Audit Games with Multiple Defender Resources.
CoRR, 2014

Human Computable Passwords.
CoRR, 2014

Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Bootstrapping Privacy Compliance in Big Data Systems.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Privacy through Accountability: A Computer Science Perspective.
Proceedings of the Distributed Computing and Internet Technology, 2014

Privacy-preserving audit for broker-based health information exchange.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

WPES 2014: 13th Workshop on Privacy in the Electronic Society.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Proceedings of the Computer Aided Verification - 26th International Conference, 2014

2013
Audit Games
CoRR, 2013

Naturally Rehearsing Passwords
CoRR, 2013

GOTCHA Password Hackers!
CoRR, 2013

Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Differentially private data analysis of social networks via restricted sensitivity.
Proceedings of the Innovations in Theoretical Computer Science, 2013

Audit Games.
Proceedings of the IJCAI 2013, 2013

Adaptive Regret Minimization in Bounded-Memory Games.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

Purpose Restrictions on Information Use.
Proceedings of the Computer Security - ESORICS 2013, 2013

GOTCHA password hackers!
Proceedings of the AISec'13, 2013

Naturally Rehearsing Passwords.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Differentially Private Data Analysis of Social Networks via Restricted Sensitivity
CoRR, 2012

The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy
CoRR, 2012

Formalizing and Enforcing Purpose Restrictions in Privacy Policies.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Parametric Verification of Address Space Separation.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Provable De-anonymization of Large Datasets with Sparse Dimensions.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Audit Mechanisms for Provable Risk Management and Accountable Data Governance.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy.
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012

2011
On Adversary Models and Compositional Security.
IEEE Security & Privacy, 2011

Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract).
Electr. Notes Theor. Comput. Sci., 2011

Adaptive Regret Minimization in Bounded-Memory Games
CoRR, 2011

On the Semantics of Purpose Requirements in Privacy Policies
CoRR, 2011

A Logical Method for Policy Enforcement over Evolving Audit Logs
CoRR, 2011

Formal Verification of Differential Privacy for Interactive Systems
CoRR, 2011

Audit Mechanisms for Privacy Protection in Healthcare Environments.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Policy auditing over incomplete logs: theory, implementation and applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Analysis Techniques for Information Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2010

Inductive trace properties for computational security.
Journal of Computer Security, 2010

Logical Methods in Security and Privacy.
IEEE Security & Privacy, 2010

Compositional System Security with Interface-Confined Adversaries.
Electr. Notes Theor. Comput. Sci., 2010

Experiences in the logical specification of the HIPAA and GLBA privacy laws.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Privacy Challenges in Patient-centric Health Information Systems.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Distributed programming with distributed authorization.
Proceedings of TLDI 2010: 2010 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, 2010

TrustVisor: Efficient TCB Reduction and Attestation.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

2009
A Logic of Secure Systems and its Application to Trusted Computing.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

ASPIER: An Automated Framework for Verifying Security Protocol Implementations.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
On the Relationships between Notions of Simulation-Based Security.
J. Cryptology, 2008

2007
Inductive Proof Method for Computational Secrecy.
IACR Cryptology ePrint Archive, 2007

Protocol Composition Logic (PCL).
Electr. Notes Theor. Comput. Sci., 2007

Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols.
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

Inductive Proofs of Computational Secrecy.
Proceedings of the Computer Security, 2007

Privacy and Utility in Business Processes.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
Compositional analysis of contract-signing protocols.
Theor. Comput. Sci., 2006

Inductive Trace Properties for Computational Security.
IACR Cryptology ePrint Archive, 2006

On the Relationships Between Notions of Simulation-Based Security.
IACR Cryptology ePrint Archive, 2006

Key Exchange Protocols: Security Definition, Proof Method and Applications.
IACR Cryptology ePrint Archive, 2006

Games and the Impossibility of Realizable Ideal Functionality.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

Privacy and Contextual Integrity: Framework and Applications.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Computationally Sound Compositional Logic for Key Exchange Protocols.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Secrecy Analysis in Protocol Composition Logic.
Proceedings of the Advances in Computer Science, 2006

2005
A derivation system and compositional logic for security protocols.
Journal of Computer Security, 2005

Games and the Impossibility of Realizable Ideal Functionality.
IACR Cryptology ePrint Archive, 2005

On the Relationships Between Notions of Simulation-Based Security.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Probabilistic Polynomial-Time Semantics for a Protocol Security Logic.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Compositional Analysis of Contract Signing Protocols.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

A modular correctness proof of IEEE 802.11i and TLS.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Abstraction and Refinement in Protocol Derivation.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
A Derivation System for Security Protocols and its Logical Formalization.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

Secure protocol composition.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003

2002
Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks.
Proceedings of the ASPDAC 2002 / VLSI Design 2002, 2002

2001
Satisfying Timing Constraints of Preemptive Real-Time Tasks through Task Layout Technique.
Proceedings of the 14th International Conference on VLSI Design (VLSI Design 2001), 2001

Information Retrieval Using UMLS-based Structured Queries.
Proceedings of the AMIA 2001, 2001


  Loading...