BibTeX records: Anupam Datta

download as .bib file

@article{DBLP:journals/corr/abs-2402-04489,
  author       = {Sanjari Srivastava and
                  Piotr Mardziel and
                  Zhikhun Zhang and
                  Archana Ahlawat and
                  Anupam Datta and
                  John C. Mitchell},
  title        = {De-amplifying Bias from Differential Privacy in Language Model Fine-tuning},
  journal      = {CoRR},
  volume       = {abs/2402.04489},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.04489},
  doi          = {10.48550/ARXIV.2402.04489},
  eprinttype    = {arXiv},
  eprint       = {2402.04489},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-04489.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23,
  author       = {Clark W. Barrett and
                  Brad Boyd and
                  Elie Bursztein and
                  Nicholas Carlini and
                  Brad Chen and
                  Jihye Choi and
                  Amrita Roy Chowdhury and
                  Mihai Christodorescu and
                  Anupam Datta and
                  Soheil Feizi and
                  Kathleen Fisher and
                  Tatsunori Hashimoto and
                  Dan Hendrycks and
                  Somesh Jha and
                  Daniel Kang and
                  Florian Kerschbaum and
                  Eric Mitchell and
                  John C. Mitchell and
                  Zulfikar Ramzan and
                  Khawaja Shams and
                  Dawn Song and
                  Ankur Taly and
                  Diyi Yang},
  title        = {Identifying and Mitigating the Security Risks of Generative {AI}},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--52},
  year         = {2023},
  url          = {https://doi.org/10.1561/3300000041},
  doi          = {10.1561/3300000041},
  timestamp    = {Sun, 24 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-14840,
  author       = {Clark W. Barrett and
                  Brad Boyd and
                  Ellie Burzstein and
                  Nicholas Carlini and
                  Brad Chen and
                  Jihye Choi and
                  Amrita Roy Chowdhury and
                  Mihai Christodorescu and
                  Anupam Datta and
                  Soheil Feizi and
                  Kathleen Fisher and
                  Tatsunori Hashimoto and
                  Dan Hendrycks and
                  Somesh Jha and
                  Daniel Kang and
                  Florian Kerschbaum and
                  Eric Mitchell and
                  John C. Mitchell and
                  Zulfikar Ramzan and
                  Khawaja Shams and
                  Dawn Song and
                  Ankur Taly and
                  Diyi Yang},
  title        = {Identifying and Mitigating the Security Risks of Generative {AI}},
  journal      = {CoRR},
  volume       = {abs/2308.14840},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.14840},
  doi          = {10.48550/ARXIV.2308.14840},
  eprinttype    = {arXiv},
  eprint       = {2308.14840},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-14840.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-09361,
  author       = {Ravi Mangal and
                  Klas Leino and
                  Zifan Wang and
                  Kai Hu and
                  Weicheng Yu and
                  Corina S. Pasareanu and
                  Anupam Datta and
                  Matt Fredrikson},
  title        = {Is Certifying {\unicode{120001}}\({}_{\mbox{p}}\) Robustness Still
                  Worthwhile?},
  journal      = {CoRR},
  volume       = {abs/2310.09361},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.09361},
  doi          = {10.48550/ARXIV.2310.09361},
  eprinttype    = {arXiv},
  eprint       = {2310.09361},
  timestamp    = {Wed, 25 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-09361.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/WangFD22,
  author       = {Zifan Wang and
                  Matt Fredrikson and
                  Anupam Datta},
  editor       = {Kamalika Chaudhuri and
                  Stefanie Jegelka and
                  Le Song and
                  Csaba Szepesv{\'{a}}ri and
                  Gang Niu and
                  Sivan Sabato},
  title        = {Robust Models Are More Interpretable Because Attributions Look Normal},
  booktitle    = {International Conference on Machine Learning, {ICML} 2022, 17-23 July
                  2022, Baltimore, Maryland, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {162},
  pages        = {22625--22651},
  publisher    = {{PMLR}},
  year         = {2022},
  url          = {https://proceedings.mlr.press/v162/wang22e.html},
  timestamp    = {Tue, 12 Jul 2022 17:36:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/WangFD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-11850,
  author       = {Zifan Wang and
                  Yuhang Yao and
                  Chaoran Zhang and
                  Han Zhang and
                  Youjie Kang and
                  Carlee Joe{-}Wong and
                  Matt Fredrikson and
                  Anupam Datta},
  title        = {Faithful Explanations for Deep Graph Models},
  journal      = {CoRR},
  volume       = {abs/2205.11850},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.11850},
  doi          = {10.48550/ARXIV.2205.11850},
  eprinttype    = {arXiv},
  eprint       = {2205.11850},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-11850.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-00192,
  author       = {Kaiji Lu and
                  Anupam Datta},
  title        = {Order-sensitive Shapley Values for Evaluating Conceptual Soundness
                  of {NLP} Models},
  journal      = {CoRR},
  volume       = {abs/2206.00192},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.00192},
  doi          = {10.48550/ARXIV.2206.00192},
  eprinttype    = {arXiv},
  eprint       = {2206.00192},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-00192.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DuttaVMDG21,
  author       = {Sanghamitra Dutta and
                  Praveen Venkatesh and
                  Piotr Mardziel and
                  Anupam Datta and
                  Pulkit Grover},
  title        = {Fairness Under Feature Exemptions: Counterfactual and Observational
                  Measures},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {67},
  number       = {10},
  pages        = {6675--6710},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIT.2021.3103206},
  doi          = {10.1109/TIT.2021.3103206},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/DuttaVMDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/DattaFLLSW21,
  author       = {Anupam Datta and
                  Matt Fredrikson and
                  Klas Leino and
                  Kaiji Lu and
                  Shayak Sen and
                  Zifan Wang},
  editor       = {Feida Zhu and
                  Beng Chin Ooi and
                  Chunyan Miao},
  title        = {Machine Learning Explainability and Robustness: Connected at the Hip},
  booktitle    = {{KDD} '21: The 27th {ACM} {SIGKDD} Conference on Knowledge Discovery
                  and Data Mining, Virtual Event, Singapore, August 14-18, 2021},
  pages        = {4035--4036},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447548.3470806},
  doi          = {10.1145/3447548.3470806},
  timestamp    = {Mon, 16 Aug 2021 16:18:31 +0200},
  biburl       = {https://dblp.org/rec/conf/kdd/DattaFLLSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/DattaFLLSSW21,
  author       = {Anupam Datta and
                  Matt Fredrikson and
                  Klas Leino and
                  Kaiji Lu and
                  Shayak Sen and
                  Ricardo Shih and
                  Zifan Wang},
  editor       = {Douwe Kiela and
                  Marco Ciccone and
                  Barbara Caputo},
  title        = {Exploring Conceptual Soundness with TruLens},
  booktitle    = {NeurIPS 2021 Competitions and Demonstrations Track, 6-14 December
                  2021, Online},
  series       = {Proceedings of Machine Learning Research},
  volume       = {176},
  pages        = {302--307},
  publisher    = {{PMLR}},
  year         = {2021},
  url          = {https://proceedings.mlr.press/v176/datta22a.html},
  timestamp    = {Thu, 11 Aug 2022 12:07:10 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/DattaFLLSSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/LuWMD21,
  author       = {Kaiji Lu and
                  Zifan Wang and
                  Piotr Mardziel and
                  Anupam Datta},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {Influence Patterns for Explaining Information Flow in {BERT}},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {4461--4474},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/239f914f30ea3c948fce2ea07a9efb33-Abstract.html},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/LuWMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-11257,
  author       = {Zifan Wang and
                  Matt Fredrikson and
                  Anupam Datta},
  title        = {Boundary Attributions Provide Normal (Vector) Explanations},
  journal      = {CoRR},
  volume       = {abs/2103.11257},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.11257},
  eprinttype    = {arXiv},
  eprint       = {2103.11257},
  timestamp    = {Tue, 06 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-11257.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-03109,
  author       = {Emily Black and
                  Zifan Wang and
                  Matt Fredrikson and
                  Anupam Datta},
  title        = {Consistent Counterfactuals for Deep Models},
  journal      = {CoRR},
  volume       = {abs/2110.03109},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.03109},
  eprinttype    = {arXiv},
  eprint       = {2110.03109},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-03109.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/DuttaVMDG20,
  author       = {Sanghamitra Dutta and
                  Praveen Venkatesh and
                  Piotr Mardziel and
                  Anupam Datta and
                  Pulkit Grover},
  title        = {An Information-Theoretic Quantification of Discrimination with Exempt
                  Features},
  booktitle    = {The Thirty-Fourth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2020, The Thirty-Second Innovative Applications of Artificial Intelligence
                  Conference, {IAAI} 2020, The Tenth {AAAI} Symposium on Educational
                  Advances in Artificial Intelligence, {EAAI} 2020, New York, NY, USA,
                  February 7-12, 2020},
  pages        = {3825--3833},
  publisher    = {{AAAI} Press},
  year         = {2020},
  url          = {https://doi.org/10.1609/aaai.v34i04.5794},
  doi          = {10.1609/AAAI.V34I04.5794},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/DuttaVMDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/LuMLFD20,
  author       = {Kaiji Lu and
                  Piotr Mardziel and
                  Klas Leino and
                  Matt Fredrikson and
                  Anupam Datta},
  editor       = {Dan Jurafsky and
                  Joyce Chai and
                  Natalie Schluter and
                  Joel R. Tetreault},
  title        = {Influence Paths for Characterizing Subject-Verb Number Agreement in
                  {LSTM} Language Models},
  booktitle    = {Proceedings of the 58th Annual Meeting of the Association for Computational
                  Linguistics, {ACL} 2020, Online, July 5-10, 2020},
  pages        = {4748--4757},
  publisher    = {Association for Computational Linguistics},
  year         = {2020},
  url          = {https://doi.org/10.18653/v1/2020.acl-main.430},
  doi          = {10.18653/V1/2020.ACL-MAIN.430},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl/LuMLFD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/LuMWAD20,
  author       = {Kaiji Lu and
                  Piotr Mardziel and
                  Fangjing Wu and
                  Preetam Amancharla and
                  Anupam Datta},
  editor       = {Vivek Nigam and
                  Tajana Ban Kirigin and
                  Carolyn L. Talcott and
                  Joshua D. Guttman and
                  Stepan L. Kuznetsov and
                  Boon Thau Loo and
                  Mitsuhiro Okada},
  title        = {Gender Bias in Neural Natural Language Processing},
  booktitle    = {Logic, Language, and Security - Essays Dedicated to Andre Scedrov
                  on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {12300},
  pages        = {189--202},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62077-6\_14},
  doi          = {10.1007/978-3-030-62077-6\_14},
  timestamp    = {Sun, 12 Feb 2023 18:48:21 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/LuMWAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/WangMDF20,
  author       = {Zifan Wang and
                  Piotr Mardziel and
                  Anupam Datta and
                  Matt Fredrikson},
  title        = {Interpreting Interpretations: Organizing Attribution Methods by Criteria},
  booktitle    = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} Workshops 2020, Seattle, WA, USA, June 14-19, 2020},
  pages        = {48--55},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2020},
  url          = {https://openaccess.thecvf.com/content\_CVPRW\_2020/html/w1/Wang\_Interpreting\_Interpretations\_Organizing\_Attribution\_Methods\_by\_Criteria\_CVPRW\_2020\_paper.html},
  doi          = {10.1109/CVPRW50498.2020.00013},
  timestamp    = {Tue, 31 Aug 2021 14:00:09 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/WangMDF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/WangWRMFD20,
  author       = {Zifan Wang and
                  Haofan Wang and
                  Shakul Ramkumar and
                  Piotr Mardziel and
                  Matt Fredrikson and
                  Anupam Datta},
  editor       = {Hugo Larochelle and
                  Marc'Aurelio Ranzato and
                  Raia Hadsell and
                  Maria{-}Florina Balcan and
                  Hsuan{-}Tien Lin},
  title        = {Smoothed Geometry for Robust Attribution},
  booktitle    = {Advances in Neural Information Processing Systems 33: Annual Conference
                  on Neural Information Processing Systems 2020, NeurIPS 2020, December
                  6-12, 2020, virtual},
  year         = {2020},
  url          = {https://proceedings.neurips.cc/paper/2020/hash/9d94c8981a48d12adfeecfe1ae6e0ec1-Abstract.html},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/WangWRMFD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TschantzSD20,
  author       = {Michael Carl Tschantz and
                  Shayak Sen and
                  Anupam Datta},
  title        = {SoK: Differential Privacy as a Causal Property},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {354--371},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00012},
  doi          = {10.1109/SP40000.2020.00012},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/TschantzSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-07985,
  author       = {Zifan Wang and
                  Piotr Mardziel and
                  Anupam Datta and
                  Matt Fredrikson},
  title        = {Interpreting Interpretations: Organizing Attribution Methods by Criteria},
  journal      = {CoRR},
  volume       = {abs/2002.07985},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.07985},
  eprinttype    = {arXiv},
  eprint       = {2002.07985},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-07985.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-01190,
  author       = {Kaiji Lu and
                  Piotr Mardziel and
                  Klas Leino and
                  Matt Fredrikson and
                  Anupam Datta},
  title        = {Influence Paths for Characterizing Subject-Verb Number Agreement in
                  {LSTM} Language Models},
  journal      = {CoRR},
  volume       = {abs/2005.01190},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.01190},
  eprinttype    = {arXiv},
  eprint       = {2005.01190},
  timestamp    = {Fri, 08 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-01190.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-06643,
  author       = {Zifan Wang and
                  Haofan Wang and
                  Shakul Ramkumar and
                  Matt Fredrikson and
                  Piotr Mardziel and
                  Anupam Datta},
  title        = {Smoothed Geometry for Robust Attribution},
  journal      = {CoRR},
  volume       = {abs/2006.06643},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.06643},
  eprinttype    = {arXiv},
  eprint       = {2006.06643},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-06643.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-07986,
  author       = {Sanghamitra Dutta and
                  Praveen Venkatesh and
                  Piotr Mardziel and
                  Anupam Datta and
                  Pulkit Grover},
  title        = {Fairness Under Feature Exemptions: Counterfactual and Observational
                  Measures},
  journal      = {CoRR},
  volume       = {abs/2006.07986},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.07986},
  eprinttype    = {arXiv},
  eprint       = {2006.07986},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-07986.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-08507,
  author       = {Xuan Chen and
                  Zifan Wang and
                  Yucai Fan and
                  Bonan Jin and
                  Piotr Mardziel and
                  Carlee Joe{-}Wong and
                  Anupam Datta},
  title        = {Towards Behavior-Level Explanation for Deep Reinforcement Learning},
  journal      = {CoRR},
  volume       = {abs/2009.08507},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.08507},
  eprinttype    = {arXiv},
  eprint       = {2009.08507},
  timestamp    = {Wed, 23 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-08507.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-00740,
  author       = {Kaiji Lu and
                  Zifan Wang and
                  Piotr Mardziel and
                  Anupam Datta},
  title        = {Abstracting Influence Paths for Explaining (Contextualization of)
                  {BERT} Models},
  journal      = {CoRR},
  volume       = {abs/2011.00740},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.00740},
  eprinttype    = {arXiv},
  eprint       = {2011.00740},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-00740.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/LeinoBFSD19,
  author       = {Klas Leino and
                  Emily Black and
                  Matt Fredrikson and
                  Shayak Sen and
                  Anupam Datta},
  title        = {Feature-Wise Bias Amplification},
  booktitle    = {7th International Conference on Learning Representations, {ICLR} 2019,
                  New Orleans, LA, USA, May 6-9, 2019},
  publisher    = {OpenReview.net},
  year         = {2019},
  url          = {https://openreview.net/forum?id=S1ecm2C9K7},
  timestamp    = {Thu, 25 Jul 2019 13:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/LeinoBFSD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigbed/ChattopadhyaySD18,
  author       = {Dhiman Chattopadhyay and
                  Abinash Samantaray and
                  Anupam Datta},
  title        = {Device microagent for IoT home gateway: a lightweight plug-n-play
                  architecture},
  journal      = {{SIGBED} Rev.},
  volume       = {15},
  number       = {2},
  pages        = {16--23},
  year         = {2018},
  url          = {https://doi.org/10.1145/3231535.3231537},
  doi          = {10.1145/3231535.3231537},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigbed/ChattopadhyaySD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fat/DattaDMMT18,
  author       = {Amit Datta and
                  Anupam Datta and
                  Jael Makagon and
                  Deirdre K. Mulligan and
                  Michael Carl Tschantz},
  editor       = {Sorelle A. Friedler and
                  Christo Wilson},
  title        = {Discrimination in Online Personalization: {A} Multidisciplinary Inquiry},
  booktitle    = {Conference on Fairness, Accountability and Transparency, {FAT} 2018,
                  23-24 February 2018, New York, NY, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {81},
  pages        = {20--34},
  publisher    = {{PMLR}},
  year         = {2018},
  url          = {http://proceedings.mlr.press/v81/datta18a.html},
  timestamp    = {Wed, 03 Apr 2019 18:17:20 +0200},
  biburl       = {https://dblp.org/rec/conf/fat/DattaDMMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itc/LeinoSDFL18,
  author       = {Klas Leino and
                  Shayak Sen and
                  Anupam Datta and
                  Matt Fredrikson and
                  Linyi Li},
  title        = {Influence-Directed Explanations for Deep Convolutional Networks},
  booktitle    = {{IEEE} International Test Conference, {ITC} 2018, Phoenix, AZ, USA,
                  October 29 - Nov. 1, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TEST.2018.8624792},
  doi          = {10.1109/TEST.2018.8624792},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/itc/LeinoSDFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/YeomDF18,
  author       = {Samuel Yeom and
                  Anupam Datta and
                  Matt Fredrikson},
  editor       = {Samy Bengio and
                  Hanna M. Wallach and
                  Hugo Larochelle and
                  Kristen Grauman and
                  Nicol{\`{o}} Cesa{-}Bianchi and
                  Roman Garnett},
  title        = {Hunting for Discriminatory Proxies in Linear Regression Models},
  booktitle    = {Advances in Neural Information Processing Systems 31: Annual Conference
                  on Neural Information Processing Systems 2018, NeurIPS 2018, December
                  3-8, 2018, Montr{\'{e}}al, Canada},
  pages        = {4573--4583},
  year         = {2018},
  url          = {https://proceedings.neurips.cc/paper/2018/hash/6cd9313ed34ef58bad3fdd504355e72c-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/YeomDF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/Datta18b,
  author       = {Anupam Datta},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Privacy Through Accountability},
  booktitle    = {Encyclopedia of Database Systems, Second Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4614-8265-9\_80601},
  doi          = {10.1007/978-1-4614-8265-9\_80601},
  timestamp    = {Thu, 14 Feb 2019 09:43:36 +0100},
  biburl       = {https://dblp.org/rec/reference/db/Datta18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-03788,
  author       = {Klas Leino and
                  Linyi Li and
                  Shayak Sen and
                  Anupam Datta and
                  Matt Fredrikson},
  title        = {Influence-Directed Explanations for Deep Convolutional Networks},
  journal      = {CoRR},
  volume       = {abs/1802.03788},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.03788},
  eprinttype    = {arXiv},
  eprint       = {1802.03788},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-03788.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-10815,
  author       = {Shayak Sen and
                  Piotr Mardziel and
                  Anupam Datta and
                  Matthew Fredrikson},
  title        = {Supervising Feature Influence},
  journal      = {CoRR},
  volume       = {abs/1803.10815},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.10815},
  eprinttype    = {arXiv},
  eprint       = {1803.10815},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-10815.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-11714,
  author       = {Kaiji Lu and
                  Piotr Mardziel and
                  Fangjing Wu and
                  Preetam Amancharla and
                  Anupam Datta},
  title        = {Gender Bias in Neural Natural Language Processing},
  journal      = {CoRR},
  volume       = {abs/1807.11714},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.11714},
  eprinttype    = {arXiv},
  eprint       = {1807.11714},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-11714.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-01735,
  author       = {Anupam Datta and
                  Shayak Sen and
                  Michael Carl Tschantz},
  title        = {Correspondences between Privacy and Nondiscrimination: Why They Should
                  Be Studied Together},
  journal      = {CoRR},
  volume       = {abs/1808.01735},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.01735},
  eprinttype    = {arXiv},
  eprint       = {1808.01735},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-01735.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-07155,
  author       = {Samuel Yeom and
                  Anupam Datta and
                  Matt Fredrikson},
  title        = {Hunting for Discriminatory Proxies in Linear Regression Models},
  journal      = {CoRR},
  volume       = {abs/1810.07155},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.07155},
  eprinttype    = {arXiv},
  eprint       = {1810.07155},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-07155.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-08999,
  author       = {Klas Leino and
                  Matt Fredrikson and
                  Emily Black and
                  Shayak Sen and
                  Anupam Datta},
  title        = {Feature-Wise Bias Amplification},
  journal      = {CoRR},
  volume       = {abs/1812.08999},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.08999},
  eprinttype    = {arXiv},
  eprint       = {1812.08999},
  timestamp    = {Wed, 02 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-08999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DattaFKMS17,
  author       = {Anupam Datta and
                  Matthew Fredrikson and
                  Gihyuk Ko and
                  Piotr Mardziel and
                  Shayak Sen},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Use Privacy in Data-Driven Systems: Theory and Experiments with Machine
                  Learnt Programs},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1193--1210},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134097},
  doi          = {10.1145/3133956.3134097},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DattaFKMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/Blocki0DV17,
  author       = {Jeremiah Blocki and
                  Manuel Blum and
                  Anupam Datta and
                  Santosh S. Vempala},
  editor       = {Christos H. Papadimitriou},
  title        = {Towards Human Computable Passwords},
  booktitle    = {8th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2017, January 9-11, 2017, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {67},
  pages        = {10:1--10:47},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2017},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2017.10},
  doi          = {10.4230/LIPICS.ITCS.2017.10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/Blocki0DV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2017iwpe,
  editor       = {Jos{\'{e}} M. del {\'{A}}lamo and
                  Seda F. G{\"{u}}rses and
                  Anupam Datta},
  title        = {Proceedings of the 3rd International Workshop on Privacy Engineering
                  co-located with 38th {IEEE} Symposium on Security and Privacy, IWPE@SP
                  2017, San Jose, CA, USA, May 25, 2017},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1873},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-1873},
  urn          = {urn:nbn:de:0074-1873-1},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/2017iwpe.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DattaFKMS17,
  author       = {Anupam Datta and
                  Matthew Fredrikson and
                  Gihyuk Ko and
                  Piotr Mardziel and
                  Shayak Sen},
  title        = {Use Privacy in Data-Driven Systems: Theory and Experiments with Machine
                  Learnt Programs},
  journal      = {CoRR},
  volume       = {abs/1705.07807},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.07807},
  eprinttype    = {arXiv},
  eprint       = {1705.07807},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DattaFKMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DattaFKMS17aa,
  author       = {Anupam Datta and
                  Matt Fredrikson and
                  Gihyuk Ko and
                  Piotr Mardziel and
                  Shayak Sen},
  title        = {Proxy Non-Discrimination in Data-Driven Systems},
  journal      = {CoRR},
  volume       = {abs/1707.08120},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.08120},
  eprinttype    = {arXiv},
  eprint       = {1707.08120},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DattaFKMS17aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-05899,
  author       = {Michael Carl Tschantz and
                  Shayak Sen and
                  Anupam Datta},
  title        = {Differential Privacy as a Causal Property},
  journal      = {CoRR},
  volume       = {abs/1710.05899},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.05899},
  eprinttype    = {arXiv},
  eprint       = {1710.05899},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-05899.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-10816,
  author       = {Anupam Datta and
                  Sophia Kovaleva and
                  Piotr Mardziel and
                  Shayak Sen},
  title        = {Latent Factor Interpretations for Collaborative Filtering},
  journal      = {CoRR},
  volume       = {abs/1711.10816},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.10816},
  eprinttype    = {arXiv},
  eprint       = {1711.10816},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-10816.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/WeerakkodySKD16,
  author       = {Sean Weerakkody and
                  Bruno Sinopoli and
                  Soummya Kar and
                  Anupam Datta},
  title        = {Information flow for security in control systems},
  booktitle    = {55th {IEEE} Conference on Decision and Control, {CDC} 2016, Las Vegas,
                  NV, USA, December 12-14, 2016},
  pages        = {5065--5072},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CDC.2016.7799044},
  doi          = {10.1109/CDC.2016.7799044},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/WeerakkodySKD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpsweek/DattaKSW16,
  author       = {Anupam Datta and
                  Soummya Kar and
                  Bruno Sinopoli and
                  Sean Weerakkody},
  title        = {Accountability in cyber-physical systems},
  booktitle    = {2016 Science of Security for Cyber-Physical Systems Workshop, SOSCYPS@CPSWeek
                  2016, Vienna, Austria, April 11, 2016},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SOSCYPS.2016.7579998},
  doi          = {10.1109/SOSCYPS.2016.7579998},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cpsweek/DattaKSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BlockiD16,
  author       = {Jeremiah Blocki and
                  Anupam Datta},
  title        = {{CASH:} {A} Cost Asymmetric Secure Hash Algorithm for Optimal Password
                  Protection},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {371--386},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.33},
  doi          = {10.1109/CSF.2016.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BlockiD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BlockiDB16,
  author       = {Jeremiah Blocki and
                  Anupam Datta and
                  Joseph Bonneau},
  title        = {Differentially Private Password Frequency Lists},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/differentially-private-password-frequency-lists.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BlockiDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DattaSZ16,
  author       = {Anupam Datta and
                  Shayak Sen and
                  Yair Zick},
  title        = {Algorithmic Transparency via Quantitative Input Influence: Theory
                  and Experiments with Learning Systems},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {598--617},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.42},
  doi          = {10.1109/SP.2016.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/DattaSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/VasudevanCMJD16,
  author       = {Amit Vasudevan and
                  Sagar Chaki and
                  Petros Maniatis and
                  Limin Jia and
                  Anupam Datta},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {{\"{u}}berSpark: Enforcing Verifiable Object Abstractions for
                  Automated Compositional Security Analysis of a Hypervisor},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {87--104},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/vasudevan},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/VasudevanCMJD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WeerakkodySKD16,
  author       = {Sean Weerakkody and
                  Bruno Sinopoli and
                  Soummya Kar and
                  Anupam Datta},
  title        = {Information Flow for Security in Control Systems},
  journal      = {CoRR},
  volume       = {abs/1603.05710},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.05710},
  eprinttype    = {arXiv},
  eprint       = {1603.05710},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WeerakkodySKD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChongGDMPSSZ16,
  author       = {Stephen Chong and
                  Joshua D. Guttman and
                  Anupam Datta and
                  Andrew C. Myers and
                  Benjamin C. Pierce and
                  Patrick Schaumont and
                  Tim Sherwood and
                  Nickolai Zeldovich},
  title        = {Report on the {NSF} Workshop on Formal Methods for Security},
  journal      = {CoRR},
  volume       = {abs/1608.00678},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.00678},
  eprinttype    = {arXiv},
  eprint       = {1608.00678},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/ChongGDMPSSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlockiDB16,
  author       = {Jeremiah Blocki and
                  Anupam Datta and
                  Joseph Bonneau},
  title        = {Differentially Private Password Frequency Lists},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlockiDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DattaTD15,
  author       = {Amit Datta and
                  Michael Carl Tschantz and
                  Anupam Datta},
  title        = {Automated Experiments on Ad Privacy Settings},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2015},
  number       = {1},
  pages        = {92--112},
  year         = {2015},
  url          = {https://doi.org/10.1515/popets-2015-0007},
  doi          = {10.1515/POPETS-2015-0007},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DattaTD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/BlockiCDPS15,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Ariel D. Procaccia and
                  Arunesh Sinha},
  editor       = {Blai Bonet and
                  Sven Koenig},
  title        = {Audit Games with Multiple Defender Resources},
  booktitle    = {Proceedings of the Twenty-Ninth {AAAI} Conference on Artificial Intelligence,
                  January 25-30, 2015, Austin, Texas, {USA}},
  pages        = {791--797},
  publisher    = {{AAAI} Press},
  year         = {2015},
  url          = {https://doi.org/10.1609/aaai.v29i1.9317},
  doi          = {10.1609/AAAI.V29I1.9317},
  timestamp    = {Mon, 18 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/BlockiCDPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chowdhury0JD15,
  author       = {Omar Chowdhury and
                  Deepak Garg and
                  Limin Jia and
                  Anupam Datta},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Equivalence-based Security for Querying Encrypted Databases: Theory
                  and Application to Privacy Policy Audits},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1130--1143},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813638},
  doi          = {10.1145/2810103.2813638},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Chowdhury0JD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Datta0KSS15,
  author       = {Anupam Datta and
                  Deepak Garg and
                  Dilsun Kirli Kaynar and
                  Divya Sharma and
                  Arunesh Sinha},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {Program Actions as Actual Causes: {A} Building Block for Accountability},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {261--275},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.25},
  doi          = {10.1109/CSF.2015.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Datta0KSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JiaS0D15,
  author       = {Limin Jia and
                  Shayak Sen and
                  Deepak Garg and
                  Anupam Datta},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {A Logic of Programs with Interface-Confined Code},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {512--525},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.38},
  doi          = {10.1109/CSF.2015.38},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/JiaS0D15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/TschantzDDW15,
  author       = {Michael Carl Tschantz and
                  Amit Datta and
                  Anupam Datta and
                  Jeannette M. Wing},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {A Methodology for Information Flow Experiments},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {554--568},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.40},
  doi          = {10.1109/CSF.2015.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/TschantzDDW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/CarbonaraDSZ15,
  author       = {Alejandro Uriel Carbonara and
                  Anupam Datta and
                  Arunesh Sinha and
                  Yair Zick},
  editor       = {Qiang Yang and
                  Michael J. Wooldridge},
  title        = {Incentivizing Peer Grading in {MOOCS:} An Audit Game Approach},
  booktitle    = {Proceedings of the Twenty-Fourth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2015, Buenos Aires, Argentina, July
                  25-31, 2015},
  pages        = {497--503},
  publisher    = {{AAAI} Press},
  year         = {2015},
  url          = {http://ijcai.org/Abstract/15/076},
  timestamp    = {Tue, 20 Aug 2019 16:16:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/CarbonaraDSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/DattaDPZ15,
  author       = {Amit Datta and
                  Anupam Datta and
                  Ariel D. Procaccia and
                  Yair Zick},
  editor       = {Qiang Yang and
                  Michael J. Wooldridge},
  title        = {Influence in Classification via Cooperative Game Theory},
  booktitle    = {Proceedings of the Twenty-Fourth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2015, Buenos Aires, Argentina, July
                  25-31, 2015},
  pages        = {511--517},
  publisher    = {{AAAI} Press},
  year         = {2015},
  url          = {http://ijcai.org/Abstract/15/078},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/DattaDPZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BlockiKCD15,
  author       = {Jeremiah Blocki and
                  Saranga Komanduri and
                  Lorrie Faith Cranor and
                  Anupam Datta},
  title        = {Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/spaced-repetition-and-mnemonics-enable-recall-multiple-strong-passwords},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BlockiKCD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/KaneCDK15,
  author       = {Aaron Kane and
                  Omar Chowdhury and
                  Anupam Datta and
                  Philip Koopman},
  editor       = {Ezio Bartocci and
                  Rupak Majumdar},
  title        = {A Case Study on Runtime Monitoring of an Autonomous Research Vehicle
                  {(ARV)} System},
  booktitle    = {Runtime Verification - 6th International Conference, {RV} 2015 Vienna,
                  Austria, September 22-25, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9333},
  pages        = {102--117},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23820-3\_7},
  doi          = {10.1007/978-3-319-23820-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/KaneCDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JiaS0D15,
  author       = {Limin Jia and
                  Shayak Sen and
                  Deepak Garg and
                  Anupam Datta},
  title        = {System {M:} {A} Program Logic for Code Sandboxing and Identification},
  journal      = {CoRR},
  volume       = {abs/1501.05673},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.05673},
  eprinttype    = {arXiv},
  eprint       = {1501.05673},
  timestamp    = {Sun, 16 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JiaS0D15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DattaDPZ15,
  author       = {Amit Datta and
                  Anupam Datta and
                  Ariel D. Procaccia and
                  Yair Zick},
  title        = {Influence in Classification via Cooperative Game Theory},
  journal      = {CoRR},
  volume       = {abs/1505.00036},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.00036},
  eprinttype    = {arXiv},
  eprint       = {1505.00036},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DattaDPZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Datta0KSS15a,
  author       = {Anupam Datta and
                  Deepak Garg and
                  Dilsun Kirli Kaynar and
                  Divya Sharma and
                  Arunesh Sinha},
  title        = {Program Actions as Actual Causes: {A} Building Block for Accountability},
  journal      = {CoRR},
  volume       = {abs/1505.01131},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.01131},
  eprinttype    = {arXiv},
  eprint       = {1505.01131},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Datta0KSS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Chowdhury0JD15,
  author       = {Omar Chowdhury and
                  Deepak Garg and
                  Limin Jia and
                  Anupam Datta},
  title        = {Equivalence-based Security for Querying Encrypted Databases: Theory
                  and Application to Privacy Policy Audits},
  journal      = {CoRR},
  volume       = {abs/1508.02448},
  year         = {2015},
  url          = {http://arxiv.org/abs/1508.02448},
  eprinttype    = {arXiv},
  eprint       = {1508.02448},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Chowdhury0JD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlockiD15,
  author       = {Jeremiah Blocki and
                  Anupam Datta},
  title        = {{CASH:} {A} Cost Asymmetric Secure Hash Algorithm for Optimal Password
                  Protection},
  journal      = {CoRR},
  volume       = {abs/1509.00239},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.00239},
  eprinttype    = {arXiv},
  eprint       = {1509.00239},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlockiD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DattaHM0S15,
  author       = {Anupam Datta and
                  Joseph Y. Halpern and
                  John C. Mitchell and
                  Arnab Roy and
                  Shayak Sen},
  title        = {A Symbolic Logic with Concrete Bounds for Cryptographic Protocols},
  journal      = {CoRR},
  volume       = {abs/1511.07536},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.07536},
  eprinttype    = {arXiv},
  eprint       = {1511.07536},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DattaHM0S15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlockiBD15,
  author       = {Jeremiah Blocki and
                  Manuel Blum and
                  Anupam Datta},
  title        = {Naturally Rehearsing Passwords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlockiBD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ChowdhuryJGD14,
  author       = {Omar Chowdhury and
                  Limin Jia and
                  Deepak Garg and
                  Anupam Datta},
  editor       = {Armin Biere and
                  Roderick Bloem},
  title        = {Temporal Mode-Checking for Runtime Monitoring of Privacy Policies},
  booktitle    = {Computer Aided Verification - 26th International Conference, {CAV}
                  2014, Held as Part of the Vienna Summer of Logic, {VSL} 2014, Vienna,
                  Austria, July 18-22, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8559},
  pages        = {131--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08867-9\_9},
  doi          = {10.1007/978-3-319-08867-9\_9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ChowdhuryJGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AhnD14,
  author       = {Gail{-}Joon Ahn and
                  Anupam Datta},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{WPES} 2014: 13th Workshop on Privacy in the Electronic Society},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1546--1547},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660383},
  doi          = {10.1145/2660267.2660383},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AhnD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/OhCJGGD14,
  author       = {Se Eun Oh and
                  Ji Young Chun and
                  Limin Jia and
                  Deepak Garg and
                  Carl A. Gunter and
                  Anupam Datta},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {Privacy-preserving audit for broker-based health information exchange},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {313--320},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557576},
  doi          = {10.1145/2557547.2557576},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/OhCJGGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/Datta14,
  author       = {Anupam Datta},
  editor       = {Raja Natarajan},
  title        = {Privacy through Accountability: {A} Computer Science Perspective},
  booktitle    = {Distributed Computing and Internet Technology - 10th International
                  Conference, {ICDCIT} 2014, Bhubaneswar, India, February 6-9, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8337},
  pages        = {43--49},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04483-5\_5},
  doi          = {10.1007/978-3-319-04483-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcit/Datta14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SenGDRTW14,
  author       = {Shayak Sen and
                  Saikat Guha and
                  Anupam Datta and
                  Sriram K. Rajamani and
                  Janice Y. Tsai and
                  Jeannette M. Wing},
  title        = {Bootstrapping Privacy Compliance in Big Data Systems},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {327--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.28},
  doi          = {10.1109/SP.2014.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SenGDRTW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DeBruhlKDST14,
  author       = {Bruce DeBruhl and
                  Christian Kroer and
                  Anupam Datta and
                  Tuomas Sandholm and
                  Patrick Tague},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Power napping with loud neighbors: optimal energy-constrained jamming
                  and anti-jamming},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {117--128},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627406},
  doi          = {10.1145/2627393.2627406},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DeBruhlKDST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2014,
  editor       = {Gail{-}Joon Ahn and
                  Anupam Datta},
  title        = {Proceedings of the 13th Workshop on Privacy in the Electronic Society,
                  {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2665943},
  isbn         = {978-1-4503-3148-7},
  timestamp    = {Fri, 20 Mar 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlockiBD14,
  author       = {Jeremiah Blocki and
                  Manuel Blum and
                  Anupam Datta},
  title        = {Human Computable Passwords},
  journal      = {CoRR},
  volume       = {abs/1404.0024},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.0024},
  eprinttype    = {arXiv},
  eprint       = {1404.0024},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlockiBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TschantzDDW14,
  author       = {Michael Carl Tschantz and
                  Amit Datta and
                  Anupam Datta and
                  Jeannette M. Wing},
  title        = {A Methodology for Information Flow Experiments},
  journal      = {CoRR},
  volume       = {abs/1405.2376},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.2376},
  eprinttype    = {arXiv},
  eprint       = {1405.2376},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TschantzDDW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DattaTD14,
  author       = {Amit Datta and
                  Michael Carl Tschantz and
                  Anupam Datta},
  title        = {Automated Experiments on Ad Privacy Settings: {A} Tale of Opacity,
                  Choice, and Discrimination},
  journal      = {CoRR},
  volume       = {abs/1408.6491},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.6491},
  eprinttype    = {arXiv},
  eprint       = {1408.6491},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DattaTD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlockiCDPS14,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Ariel D. Procaccia and
                  Arunesh Sinha},
  title        = {Audit Games with Multiple Defender Resources},
  journal      = {CoRR},
  volume       = {abs/1409.4503},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.4503},
  eprinttype    = {arXiv},
  eprint       = {1409.4503},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlockiCDPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlockiKCD14,
  author       = {Jeremiah Blocki and
                  Saranga Komanduri and
                  Lorrie Faith Cranor and
                  Anupam Datta},
  title        = {Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords},
  journal      = {CoRR},
  volume       = {abs/1410.1490},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.1490},
  eprinttype    = {arXiv},
  eprint       = {1410.1490},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlockiKCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BlockiBD13,
  author       = {Jeremiah Blocki and
                  Manuel Blum and
                  Anupam Datta},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Naturally Rehearsing Passwords},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {361--380},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_19},
  doi          = {10.1007/978-3-642-42045-0\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BlockiBD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BlockiBD13,
  author       = {Jeremiah Blocki and
                  Manuel Blum and
                  Anupam Datta},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {{GOTCHA} password hackers!},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517319},
  doi          = {10.1145/2517312.2517319},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BlockiBD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TschantzDW13,
  author       = {Michael Carl Tschantz and
                  Anupam Datta and
                  Jeannette M. Wing},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Purpose Restrictions on Information Use},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {610--627},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_34},
  doi          = {10.1007/978-3-642-40203-6\_34},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/TschantzDW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BlockiCDS13,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Arunesh Sinha},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Adaptive Regret Minimization in Bounded-Memory Games},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_5},
  doi          = {10.1007/978-3-319-02786-9\_5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BlockiCDS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/BlockiCDPS13,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Ariel D. Procaccia and
                  Arunesh Sinha},
  editor       = {Francesca Rossi},
  title        = {Audit Games},
  booktitle    = {{IJCAI} 2013, Proceedings of the 23rd International Joint Conference
                  on Artificial Intelligence, Beijing, China, August 3-9, 2013},
  pages        = {41--47},
  publisher    = {{IJCAI/AAAI}},
  year         = {2013},
  url          = {http://www.aaai.org/ocs/index.php/IJCAI/IJCAI13/paper/view/6951},
  timestamp    = {Tue, 23 Jan 2024 13:25:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/BlockiCDPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BlockiBDS13,
  author       = {Jeremiah Blocki and
                  Avrim Blum and
                  Anupam Datta and
                  Or Sheffet},
  editor       = {Robert D. Kleinberg},
  title        = {Differentially private data analysis of social networks via restricted
                  sensitivity},
  booktitle    = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
                  CA, USA, January 9-12, 2013},
  pages        = {87--96},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2422436.2422449},
  doi          = {10.1145/2422436.2422449},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BlockiBDS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ChowdhuryGNRBDJW13,
  author       = {Omar Chowdhury and
                  Andreas Gampe and
                  Jianwei Niu and
                  Jeffery von Ronne and
                  Jared Bennatt and
                  Anupam Datta and
                  Limin Jia and
                  William H. Winsborough},
  editor       = {Mauro Conti and
                  Jaideep Vaidya and
                  Andreas Schaad},
  title        = {Privacy promises that can be kept: a policy analysis method with application
                  to the {HIPAA} privacy rule},
  booktitle    = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462410.2462423},
  doi          = {10.1145/2462410.2462423},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ChowdhuryGNRBDJW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VasudevanCJMND13,
  author       = {Amit Vasudevan and
                  Sagar Chaki and
                  Limin Jia and
                  Jonathan M. McCune and
                  James Newsome and
                  Anupam Datta},
  title        = {Design, Implementation and Verification of an eXtensible and Modular
                  Hypervisor Framework},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {430--444},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.36},
  doi          = {10.1109/SP.2013.36},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/VasudevanCJMND13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-5122,
  author       = {Jeremiah Blocki and
                  Manuel Blum and
                  Anupam Datta},
  title        = {Naturally Rehearsing Passwords},
  journal      = {CoRR},
  volume       = {abs/1302.5122},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.5122},
  eprinttype    = {arXiv},
  eprint       = {1302.5122},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-5122.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-0356,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Ariel D. Procaccia and
                  Arunesh Sinha},
  title        = {Audit Games},
  journal      = {CoRR},
  volume       = {abs/1303.0356},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.0356},
  eprinttype    = {arXiv},
  eprint       = {1303.0356},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-0356.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlockiBD13,
  author       = {Jeremiah Blocki and
                  Manuel Blum and
                  Anupam Datta},
  title        = {{GOTCHA} Password Hackers!},
  journal      = {CoRR},
  volume       = {abs/1310.1137},
  year         = {2013},
  url          = {http://arxiv.org/abs/1310.1137},
  eprinttype    = {arXiv},
  eprint       = {1310.1137},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlockiBD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BlockiBDS12,
  author       = {Jeremiah Blocki and
                  Avrim Blum and
                  Anupam Datta and
                  Or Sheffet},
  title        = {The Johnson-Lindenstrauss Transform Itself Preserves Differential
                  Privacy},
  booktitle    = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2012, New Brunswick, NJ, USA, October 20-23, 2012},
  pages        = {410--419},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FOCS.2012.67},
  doi          = {10.1109/FOCS.2012.67},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BlockiBDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BlockiCDS12,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Arunesh Sinha},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Audit Mechanisms for Provable Risk Management and Accountable Data
                  Governance},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {38--59},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_3},
  doi          = {10.1007/978-3-642-34266-0\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BlockiCDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/FranklinCDMV12,
  author       = {Jason Franklin and
                  Sagar Chaki and
                  Anupam Datta and
                  Jonathan M. McCune and
                  Amit Vasudevan},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Parametric Verification of Address Space Separation},
  booktitle    = {Principles of Security and Trust - First International Conference,
                  {POST} 2012, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
                  - April 1, 2012, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7215},
  pages        = {51--68},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28641-4\_4},
  doi          = {10.1007/978-3-642-28641-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/FranklinCDMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/DattaSS12,
  author       = {Anupam Datta and
                  Divya Sharma and
                  Arunesh Sinha},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Provable De-anonymization of Large Datasets with Sparse Dimensions},
  booktitle    = {Principles of Security and Trust - First International Conference,
                  {POST} 2012, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
                  - April 1, 2012, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7215},
  pages        = {229--248},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28641-4\_13},
  doi          = {10.1007/978-3-642-28641-4\_13},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/DattaSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TschantzDW12,
  author       = {Michael Carl Tschantz and
                  Anupam Datta and
                  Jeannette M. Wing},
  title        = {Formalizing and Enforcing Purpose Restrictions in Privacy Policies},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {176--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.21},
  doi          = {10.1109/SP.2012.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/TschantzDW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2011,
  editor       = {Gilles Barthe and
                  Anupam Datta and
                  Sandro Etalle},
  title        = {Formal Aspects of Security and Trust - 8th International Workshop,
                  {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7140},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29420-4},
  doi          = {10.1007/978-3-642-29420-4},
  isbn         = {978-3-642-29419-8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1204-2136,
  author       = {Jeremiah Blocki and
                  Avrim Blum and
                  Anupam Datta and
                  Or Sheffet},
  title        = {The Johnson-Lindenstrauss Transform Itself Preserves Differential
                  Privacy},
  journal      = {CoRR},
  volume       = {abs/1204.2136},
  year         = {2012},
  url          = {http://arxiv.org/abs/1204.2136},
  eprinttype    = {arXiv},
  eprint       = {1204.2136},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1204-2136.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-4586,
  author       = {Jeremiah Blocki and
                  Avrim Blum and
                  Anupam Datta and
                  Or Sheffet},
  title        = {Differentially Private Data Analysis of Social Networks via Restricted
                  Sensitivity},
  journal      = {CoRR},
  volume       = {abs/1208.4586},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.4586},
  eprinttype    = {arXiv},
  eprint       = {1208.4586},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-4586.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DattaFGJK11,
  author       = {Anupam Datta and
                  Jason Franklin and
                  Deepak Garg and
                  Limin Jia and
                  Dilsun Kirli Kaynar},
  title        = {On Adversary Models and Compositional Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {3},
  pages        = {26--32},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2010.203},
  doi          = {10.1109/MSP.2010.203},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DattaFGJK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GargJD11,
  author       = {Deepak Garg and
                  Limin Jia and
                  Anupam Datta},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Policy auditing over incomplete logs: theory, implementation and applications},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {151--162},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046726},
  doi          = {10.1145/2046707.2046726},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GargJD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BlockiCDS11,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Arunesh Sinha},
  title        = {Regret Minimizing Audits: {A} Learning-Theoretic Basis for Privacy
                  Protection},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {312--327},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.28},
  doi          = {10.1109/CSF.2011.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BlockiCDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DattaBCDGJKS11,
  author       = {Anupam Datta and
                  Jeremiah Blocki and
                  Nicolas Christin and
                  Henry DeYoung and
                  Deepak Garg and
                  Limin Jia and
                  Dilsun Kirli Kaynar and
                  Arunesh Sinha},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Understanding and Protecting Privacy: Formal Semantics and Principled
                  Audit Mechanisms},
  booktitle    = {Information Systems Security - 7th International Conference, {ICISS}
                  2011, Kolkata, India, December 15-19, 2011, Procedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {1--27},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25560-1\_1},
  doi          = {10.1007/978-3-642-25560-1\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/DattaBCDGJKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlockiCDS11,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Arunesh Sinha},
  editor       = {Ben Adida and
                  Umesh Shankar},
  title        = {Audit Mechanisms for Privacy Protection in Healthcare Environments},
  booktitle    = {2nd {USENIX} Workshop on Health Security and Privacy, HealthSec'11,
                  San Francisco, CA, USA, August 9, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/healthsec11/audit-mechanisms-privacy-protection-healthcare-environments},
  timestamp    = {Mon, 01 Feb 2021 17:03:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BlockiCDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/TschantzKD11,
  author       = {Michael Carl Tschantz and
                  Dilsun Kirli Kaynar and
                  Anupam Datta},
  editor       = {Michael W. Mislove and
                  Jo{\"{e}}l Ouaknine},
  title        = {Formal Verification of Differential Privacy for Interactive Systems
                  (Extended Abstract)},
  booktitle    = {Twenty-seventh Conference on the Mathematical Foundations of Programming
                  Semantics, {MFPS} 2011, Pittsburgh, PA, USA, May 25-28, 2011},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {276},
  pages        = {61--79},
  publisher    = {Elsevier},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.entcs.2011.09.015},
  doi          = {10.1016/J.ENTCS.2011.09.015},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/TschantzKD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/DattaM0S11,
  author       = {Anupam Datta and
                  John C. Mitchell and
                  Arnab Roy and
                  Stephan Hyeonjun Stiller},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Protocol Composition Logic},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {182--221},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-182},
  doi          = {10.3233/978-1-60750-714-7-182},
  timestamp    = {Fri, 15 May 2020 12:11:04 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/DattaM0S11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-2819,
  author       = {Michael Carl Tschantz and
                  Dilsun Kirli Kaynar and
                  Anupam Datta},
  title        = {Formal Verification of Differential Privacy for Interactive Systems},
  journal      = {CoRR},
  volume       = {abs/1101.2819},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.2819},
  eprinttype    = {arXiv},
  eprint       = {1101.2819},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-2819.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-2521,
  author       = {Deepak Garg and
                  Limin Jia and
                  Anupam Datta},
  title        = {A Logical Method for Policy Enforcement over Evolving Audit Logs},
  journal      = {CoRR},
  volume       = {abs/1102.2521},
  year         = {2011},
  url          = {http://arxiv.org/abs/1102.2521},
  eprinttype    = {arXiv},
  eprint       = {1102.2521},
  timestamp    = {Sun, 16 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1102-2521.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-4326,
  author       = {Michael Carl Tschantz and
                  Anupam Datta and
                  Jeannette M. Wing},
  title        = {On the Semantics of Purpose Requirements in Privacy Policies},
  journal      = {CoRR},
  volume       = {abs/1102.4326},
  year         = {2011},
  url          = {http://arxiv.org/abs/1102.4326},
  eprinttype    = {arXiv},
  eprint       = {1102.4326},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1102-4326.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-2888,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Arunesh Sinha},
  title        = {Adaptive Regret Minimization in Bounded-Memory Games},
  journal      = {CoRR},
  volume       = {abs/1111.2888},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.2888},
  eprinttype    = {arXiv},
  eprint       = {1111.2888},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-2888.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/synthesis/2010Datta,
  author       = {Anupam Datta and
                  Somesh Jha and
                  Ninghui Li and
                  David Melski and
                  Thomas W. Reps},
  title        = {Analysis Techniques for Information Security},
  series       = {Synthesis Lectures on Information Security, Privacy, and Trust},
  publisher    = {Morgan {\&} Claypool Publishers},
  year         = {2010},
  url          = {https://doi.org/10.2200/S00260ED1V01Y201003SPT002},
  doi          = {10.2200/S00260ED1V01Y201003SPT002},
  isbn         = {978-3-031-01206-8},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/synthesis/2010Datta.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Datta10,
  author       = {Anupam Datta},
  title        = {Logical Methods in Security and Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {6},
  pages        = {86--89},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.180},
  doi          = {10.1109/MSP.2010.180},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Datta10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RoyDDM10,
  author       = {Arnab Roy and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell},
  title        = {Inductive trace properties for computational security},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {6},
  pages        = {1035--1073},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-389},
  doi          = {10.3233/JCS-2009-389},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RoyDDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/McCuneLQZDGP10,
  author       = {Jonathan M. McCune and
                  Yanlin Li and
                  Ning Qu and
                  Zongwei Zhou and
                  Anupam Datta and
                  Virgil D. Gligor and
                  Adrian Perrig},
  title        = {TrustVisor: Efficient {TCB} Reduction and Attestation},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {143--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.17},
  doi          = {10.1109/SP.2010.17},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/McCuneLQZDGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FranklinCDS10,
  author       = {Jason Franklin and
                  Sagar Chaki and
                  Anupam Datta and
                  Arvind Seshadri},
  title        = {Scalable Parametric Verification of Secure Systems: How to Verify
                  Reference Monitors without Worrying about Data Structure Size},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {365--379},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.29},
  doi          = {10.1109/SP.2010.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FranklinCDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tldi/AvijitDH10,
  author       = {Kumar Avijit and
                  Anupam Datta and
                  Robert Harper},
  editor       = {Andrew Kennedy and
                  Nick Benton},
  title        = {Distributed programming with distributed authorization},
  booktitle    = {Proceedings of {TLDI} 2010: 2010 {ACM} {SIGPLAN} International Workshop
                  on Types in Languages Design and Implementation, Madrid, Spain, January
                  23, 2010},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1708016.1708021},
  doi          = {10.1145/1708016.1708021},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tldi/AvijitDH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DattaDMNS10,
  author       = {Anupam Datta and
                  Nipun Dave and
                  John C. Mitchell and
                  Helen Nissenbaum and
                  Divya Sharma},
  editor       = {Kevin Fu and
                  Tadayoshi Kohno and
                  Aviel D. Rubin},
  title        = {Privacy Challenges in Patient-centric Health Information Systems},
  booktitle    = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10,
                  Washington, D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/healthsec10/privacy-challenges-patient-centric-health-information-systems},
  timestamp    = {Mon, 01 Feb 2021 08:43:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DattaDMNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/DeYoungGJKD10,
  author       = {Henry DeYoung and
                  Deepak Garg and
                  Limin Jia and
                  Dilsun Kirli Kaynar and
                  Anupam Datta},
  editor       = {Ehab Al{-}Shaer and
                  Keith B. Frikken},
  title        = {Experiences in the logical specification of the {HIPAA} and {GLBA}
                  privacy laws},
  booktitle    = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010},
  pages        = {73--82},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866919.1866930},
  doi          = {10.1145/1866919.1866930},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/DeYoungGJKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/GargFKD10,
  author       = {Deepak Garg and
                  Jason Franklin and
                  Dilsun Kirli Kaynar and
                  Anupam Datta},
  editor       = {Michael W. Mislove and
                  Peter Selinger},
  title        = {Compositional System Security with Interface-Confined Adversaries},
  booktitle    = {Proceedings of the 26th Conference on the Mathematical Foundations
                  of Programming Semantics, {MFPS} 2010, Ottawa, Ontario, Canada, May
                  6-10, 2010},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {265},
  pages        = {49--71},
  publisher    = {Elsevier},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.entcs.2010.08.005},
  doi          = {10.1016/J.ENTCS.2010.08.005},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/GargFKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChakiD09,
  author       = {Sagar Chaki and
                  Anupam Datta},
  title        = {{ASPIER:} An Automated Framework for Verifying Security Protocol Implementations},
  booktitle    = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages        = {172--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSF.2009.20},
  doi          = {10.1109/CSF.2009.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChakiD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DattaFGK09,
  author       = {Anupam Datta and
                  Jason Franklin and
                  Deepak Garg and
                  Dilsun Kirli Kaynar},
  title        = {A Logic of Secure Systems and its Application to Trusted Computing},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {221--236},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.16},
  doi          = {10.1109/SP.2009.16},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DattaFGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asian/2009,
  editor       = {Anupam Datta},
  title        = {Advances in Computer Science - {ASIAN} 2009. Information Security
                  and Privacy, 13th Asian Computing Science Conference, Seoul, Korea,
                  December 14-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5913},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10622-4},
  doi          = {10.1007/978-3-642-10622-4},
  isbn         = {978-3-642-10621-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KustersDMR08,
  author       = {Ralf K{\"{u}}sters and
                  Anupam Datta and
                  John C. Mitchell and
                  Ajith Ramanathan},
  title        = {On the Relationships between Notions of Simulation-Based Security},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {4},
  pages        = {492--546},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-008-9019-9},
  doi          = {10.1007/S00145-008-9019-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KustersDMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BarthMDS07,
  author       = {Adam Barth and
                  John C. Mitchell and
                  Anupam Datta and
                  Sharada Sundaram},
  title        = {Privacy and Utility in Business Processes},
  booktitle    = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8
                  July 2007, Venice, Italy},
  pages        = {279--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CSF.2007.26},
  doi          = {10.1109/CSF.2007.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BarthMDS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RoyDDM07,
  author       = {Arnab Roy and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Inductive Proofs of Computational Secrecy},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {219--234},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_15},
  doi          = {10.1007/978-3-540-74835-9\_15},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RoyDDM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/RoyDM07,
  author       = {Arnab Roy and
                  Anupam Datta and
                  John C. Mitchell},
  editor       = {Gilles Barthe and
                  C{\'{e}}dric Fournet},
  title        = {Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols},
  booktitle    = {Trustworthy Global Computing, Third Symposium, {TGC} 2007, Sophia-Antipolis,
                  France, November 5-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4912},
  pages        = {312--329},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78663-4\_21},
  doi          = {10.1007/978-3-540-78663-4\_21},
  timestamp    = {Sat, 19 Oct 2019 20:09:31 +0200},
  biburl       = {https://dblp.org/rec/conf/tgc/RoyDM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DattaDMR07,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Arnab Roy},
  editor       = {Luca Cardelli and
                  Marcelo Fiore and
                  Glynn Winskel},
  title        = {Protocol Composition Logic {(PCL)}},
  booktitle    = {Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {172},
  pages        = {311--358},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.02.012},
  doi          = {10.1016/J.ENTCS.2007.02.012},
  timestamp    = {Tue, 24 Jan 2023 11:36:28 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DattaDMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyDDM07,
  author       = {Arnab Roy and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell},
  title        = {Inductive Proof Method for Computational Secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyDDM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BackesDDMT06,
  author       = {Michael Backes and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Mathieu Turuani},
  title        = {Compositional analysis of contract-signing protocols},
  journal      = {Theor. Comput. Sci.},
  volume       = {367},
  number       = {1-2},
  pages        = {33--56},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2006.08.039},
  doi          = {10.1016/J.TCS.2006.08.039},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/BackesDDMT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/RoyDDMS06,
  author       = {Arnab Roy and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Jean{-}Pierre Seifert},
  editor       = {Mitsu Okada and
                  Ichiro Satoh},
  title        = {Secrecy Analysis in Protocol Composition Logic},
  booktitle    = {Advances in Computer Science - {ASIAN} 2006. Secure Software and Related
                  Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December
                  6-8, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4435},
  pages        = {197--213},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-77505-8\_15},
  doi          = {10.1007/978-3-540-77505-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/RoyDDMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DattaDMW06,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Bogdan Warinschi},
  title        = {Computationally Sound Compositional Logic for Key Exchange Protocols},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {321--334},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.9},
  doi          = {10.1109/CSFW.2006.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DattaDMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BarthDMN06,
  author       = {Adam Barth and
                  Anupam Datta and
                  John C. Mitchell and
                  Helen Nissenbaum},
  title        = {Privacy and Contextual Integrity: Framework and Applications},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {184--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.32},
  doi          = {10.1109/SP.2006.32},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BarthDMN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DattaDMRS06,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Ajith Ramanathan and
                  Andre Scedrov},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Games and the Impossibility of Realizable Ideal Functionality},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {360--379},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_19},
  doi          = {10.1007/11681878\_19},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DattaDMRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDMW06,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Bogdan Warinschi},
  title        = {Key Exchange Protocols: Security Definition, Proof Method and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaKMR06,
  author       = {Anupam Datta and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell and
                  Ajith Ramanathan},
  title        = {On the Relationships Between Notions of Simulation-Based Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaKMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyDDM06,
  author       = {Arnab Roy and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell},
  title        = {Inductive Trace Properties for Computational Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyDDM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Datta05,
  author       = {Anupam Datta},
  title        = {Security analysis of network protocols : compositional reasoning and
                  complexity-theoretic foundations},
  school       = {Stanford University, {USA}},
  year         = {2005},
  url          = {https://searchworks.stanford.edu/view/6261591},
  timestamp    = {Wed, 31 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Datta05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DattaDMP05,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Dusko Pavlovic},
  title        = {A derivation system and compositional logic for security protocols},
  journal      = {J. Comput. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {423--482},
  year         = {2005},
  url          = {https://doi.org/10.3233/jcs-2005-13304},
  doi          = {10.3233/JCS-2005-13304},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DattaDMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeSDDM05,
  author       = {Changhua He and
                  Mukund Sundararajan and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {A modular correctness proof of {IEEE} 802.11i and {TLS}},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {2--15},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102124},
  doi          = {10.1145/1102120.1102124},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HeSDDM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesDDMT05,
  author       = {Michael Backes and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Mathieu Turuani},
  title        = {Compositional Analysis of Contract Signing Protocols},
  booktitle    = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005),
                  20-22 June 2005, Aix-en-Provence, France},
  pages        = {94--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSFW.2005.12},
  doi          = {10.1109/CSFW.2005.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesDDMT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/DattaDMST05,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Vitaly Shmatikov and
                  Mathieu Turuani},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Probabilistic Polynomial-Time Semantics for a Protocol Security Logic},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_2},
  doi          = {10.1007/11523468\_2},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/DattaDMST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DattaKMR05,
  author       = {Anupam Datta and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell and
                  Ajith Ramanathan},
  editor       = {Joe Kilian},
  title        = {On the Relationships Between Notions of Simulation-Based Security},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {476--494},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_26},
  doi          = {10.1007/978-3-540-30576-7\_26},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DattaKMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDMRS05,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Ajith Ramanathan and
                  Andre Scedrov},
  title        = {Games and the Impossibility of Realizable Ideal Functionality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDMRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DattaDMP04,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Dusko Pavlovic},
  title        = {Abstraction and Refinement in Protocol Derivation},
  booktitle    = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004),
                  28-30 June 2004, Pacific Grove, CA, {USA}},
  pages        = {30},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.4},
  doi          = {10.1109/CSFW.2004.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DattaDMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DattaDMP03,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Dusko Pavlovic},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Secure protocol composition},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {11--23},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035431},
  doi          = {10.1145/1035429.1035431},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DattaDMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DattaDMP03,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Dusko Pavlovic},
  title        = {A Derivation System for Security Protocols and its Logical Formalization},
  booktitle    = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003),
                  30 June - 2 July 2003, Pacific Grove, CA, {USA}},
  pages        = {109--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSFW.2003.1212708},
  doi          = {10.1109/CSFW.2003.1212708},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DattaDMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfps/DattaDMP03,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Dusko Pavlovic},
  editor       = {Stephen D. Brookes and
                  Prakash Panangaden},
  title        = {Secure Protocol Composition},
  booktitle    = {Proceedings of 19th Conference on the Mathematical Foundations of
                  Programming Semantics, {MFPS} 2003, Universit{\'{e}} de Montr{\'{e}}al,
                  QC, Canada, March 19-22, 2003},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {83},
  pages        = {201--226},
  publisher    = {Elsevier},
  year         = {2003},
  url          = {https://doi.org/10.1016/S1571-0661(03)50011-1},
  doi          = {10.1016/S1571-0661(03)50011-1},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mfps/DattaDMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsid/DattaCB02,
  author       = {Anupam Datta and
                  Sidharth Choudhury and
                  Anupam Basu},
  title        = {Using Randomized Rounding to Satisfy Timing Constraints of Real-Time
                  Preemptive Tasks},
  booktitle    = {Proceedings of the 7th Asia and South Pacific Design Automation Conference
                  {(ASP-DAC} 2002), and the 15th International Conference on {VLSI}
                  Design {(VLSI} Design 2002), Bangalore, India, January 7-11, 2002},
  pages        = {705--710},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ASPDAC.2002.995017},
  doi          = {10.1109/ASPDAC.2002.995017},
  timestamp    = {Mon, 14 Nov 2022 15:28:09 +0100},
  biburl       = {https://dblp.org/rec/conf/vlsid/DattaCB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amia/FaganBCCDSS01,
  author       = {Lawrence M. Fagan and
                  Daniel C. Berrios and
                  Albert Chan and
                  Russell J. Cucina and
                  Anupam Datta and
                  Maulik K. Shah and
                  Sujith Surendran},
  title        = {Information Retrieval Using UMLS-based Structured Queries},
  booktitle    = {{AMIA} 2001, American Medical Informatics Association Annual Symposium,
                  Washington, DC, USA, November 3-7, 2001},
  publisher    = {{AMIA}},
  year         = {2001},
  url          = {https://knowledge.amia.org/amia-55142-a2001a-1.597057/t-002-1.598852/f-001-1.598853/a-259-1.599359/a-260-1.599356},
  timestamp    = {Wed, 04 Aug 2021 11:13:07 +0200},
  biburl       = {https://dblp.org/rec/conf/amia/FaganBCCDSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsid/DattaCBTD01,
  author       = {Anupam Datta and
                  Sidharth Choudhury and
                  Anupam Basu and
                  Hiroyuki Tomiyama and
                  Nikil D. Dutt},
  title        = {Satisfying Timing Constraints of Preemptive Real-Time Tasks through
                  Task Layout Technique},
  booktitle    = {14th International Conference on {VLSI} Design {(VLSI} Design 2001),
                  3-7 January 2001, Bangalore, India},
  pages        = {97--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICVD.2001.902646},
  doi          = {10.1109/ICVD.2001.902646},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vlsid/DattaCBTD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics