Anupam Datta

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Fairness Under Feature Exemptions: Counterfactual and Observational Measures
IEEE Transactions on Information Theory
2022-02-17Paper
Prime Sums2021-11-01Paper
Gender bias in neural natural language processing
(available as arXiv preprint)
2021-07-08Paper
scientific article; zbMATH DE number 6866300 (Why is no real title available?)
(available as arXiv preprint)
2018-05-03Paper
Differentially private data analysis of social networks via restricted sensitivity
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
Formal verification of differential privacy for interactive systems (extended abstract)
Electronic Notes in Theoretical Computer Science
2016-07-15Paper
Compositional system security with interface-confined adversaries
Electronic Notes in Theoretical Computer Science
2016-07-08Paper
Secure protocol composition2016-05-03Paper
Adaptive Regret Minimization in Bounded-Memory Games
Lecture Notes in Computer Science
2014-09-15Paper
Adaptive Regret Minimization in Bounded-Memory Games
Lecture Notes in Computer Science
2014-09-15Paper
Naturally rehearsing passwords
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Protocol composition logic (PCL)
Electronic Notes in Theoretical Computer Science
2013-12-06Paper
Audit Mechanisms for Provable Risk Management and Accountable Data Governance
Lecture Notes in Computer Science
2013-03-13Paper
Parametric verification of address space separation
Lecture Notes in Computer Science
2012-06-29Paper
Provable de-anonymization of large datasets with sparse dimensions
Lecture Notes in Computer Science
2012-06-29Paper
On the relationships between notions of simulation-based security
Journal of Cryptology
2009-06-08Paper
Inductive Proofs of Computational Secrecy
Computer Security – ESORICS 2007
2008-08-21Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Compositional analysis of contract-signing protocols
Theoretical Computer Science
2007-01-09Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper


Research outcomes over time


This page was built for person: Anupam Datta