Derek Mitchell

Results: 33



#Item
1Foreign relations of the United States / United States federal executive departments / American diplomats / International relations / Public policy schools / Derek Chollet / James Goldgeier / Paul H. Nitze School of Advanced International Studies / Center for a New American Security / Foreign Affairs Policy Board / Derek Mitchell

1 Speakers ProgramThe list below is a partial compilation of speakers participating in ACFR’s programs duringThe list provides a good indication of the range of speakers in the ACFR network, but

Add to Reading List

Source URL: www.acfr.org

Language: English
2

Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2007-01-08 08:20:04
    3Logic / Mathematics / Abstraction / Formal languages / Mathematical logic / Linear temporal logic / Temporal logic / Automated theorem proving / Propositional calculus / Substitution / IP / Interpretation

    Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:12
    4Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

    Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:15
    5Cryptography / Key management / Shared secret / Cryptographic protocol / Challengeresponse authentication / Key-agreement protocol

    Secure Protocol Composition Anupam Datta John C. Mitchell Ante Derek Dusko Pavlovic

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:11
    6

    Secrecy Analysis in Protocol Composition Logic Arnab ROY a , Anupam DATTA b , Ante DEREK c , John C. MITCHELL a , and Jean-Pierre SEIFERT d a Stanford University, USA

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:16
      7Aung San Suu Kyi / Politics of Burma / Thein Sein / Derek Mitchell / Naypyidaw / Myitsone Dam / State Peace and Development Council / Association of Southeast Asian Nations / Foreign relations of Burma / Burma / Burmese people / Asia

      PDF Document

      Add to Reading List

      Source URL: www.lse.ac.uk

      Language: English - Date: 2013-04-21 17:23:59
      8Temporal logic / Model theory / Propositional calculus / Mathematical logic / Interpretation / Substitution / Well-formed formula / Logic / Formal languages / Linear temporal logic

      Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

      Add to Reading List

      Source URL: theory.stanford.edu

      Language: English - Date: 2004-05-03 19:17:14
      9Communications protocol / Data transmission / Protocols / Public-key cryptography / Cryptographic protocols / Network protocols / Cryptography / Data / Information

      Compositional Analysis of Contract Signing Protocols Michael Backes a , Anupam Datta b , Ante Derek b , John C. Mitchell b and Mathieu Turuani c a Saarland

      Add to Reading List

      Source URL: theory.stanford.edu

      Language: English - Date: 2007-12-18 01:01:14
      10Advantage / Cryptographic protocol / Cipher / XTR / Cryptography / Ciphertext indistinguishability / Semantic security

      Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2006-12-27 15:51:40
      UPDATE