Derek Mitchell

Results: 33



#Item
11  Speakers ProgramThe list below is a partial compilation of speakers participating in ACFR’s programs duringThe list provides a good indication of the range of speakers in the ACFR network, but

1 Speakers ProgramThe list below is a partial compilation of speakers participating in ACFR’s programs duringThe list provides a good indication of the range of speakers in the ACFR network, but

Add to Reading List

Source URL: www.acfr.org

Language: English
2Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu  Abstract

Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2007-01-08 08:20:04
    3Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

    Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:12
    4Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University  Abstract. We investigate inductive methods for proving secrecy p

    Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:15
    5Secure Protocol Composition Anupam Datta John C. Mitchell Ante Derek Dusko Pavlovic

    Secure Protocol Composition Anupam Datta John C. Mitchell Ante Derek Dusko Pavlovic

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:11
    6Secrecy Analysis in Protocol Composition Logic Arnab ROY a , Anupam DATTA b , Ante DEREK c , John C. MITCHELL a , and Jean-Pierre SEIFERT d a Stanford University, USA

    Secrecy Analysis in Protocol Composition Logic Arnab ROY a , Anupam DATTA b , Ante DEREK c , John C. MITCHELL a , and Jean-Pierre SEIFERT d a Stanford University, USA

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:16
      7

      PDF Document

      Add to Reading List

      Source URL: www.lse.ac.uk

      Language: English - Date: 2013-04-21 17:23:59
      8Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

      Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

      Add to Reading List

      Source URL: theory.stanford.edu

      Language: English - Date: 2004-05-03 19:17:14
      9Compositional Analysis of Contract Signing Protocols Michael Backes a , Anupam Datta b , Ante Derek b , John C. Mitchell b and Mathieu Turuani c a Saarland

      Compositional Analysis of Contract Signing Protocols Michael Backes a , Anupam Datta b , Ante Derek b , John C. Mitchell b and Mathieu Turuani c a Saarland

      Add to Reading List

      Source URL: theory.stanford.edu

      Language: English - Date: 2007-12-18 01:01:14
      10Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University  Abstract. Protocol authentication properties are generally

      Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2006-12-27 15:51:40