default search action
Vitaly Shmatikov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov:
Data Isotopes for Data Provenance in DNNs. Proc. Priv. Enhancing Technol. 2024(1): 413-429 (2024) - [c97]Eugene Bagdasarian, Vitaly Shmatikov:
Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines. CCS 2024: 4480-4494 - [c96]Collin Zhang, John X. Morris, Vitaly Shmatikov:
Extracting Prompts by Inverting LLM Outputs. EMNLP 2024: 14753-14777 - [c95]John X. Morris, Wenting Zhao, Justin T. Chiu, Vitaly Shmatikov, Alexander M. Rush:
Language Model Inversion. ICLR 2024 - [c94]Tingwei Zhang, Rishi D. Jha, Eugene Bagdasaryan, Vitaly Shmatikov:
Adversarial Illusions in Multi-Modal Embeddings. USENIX Security Symposium 2024 - [i41]Collin Zhang, John X. Morris, Vitaly Shmatikov:
Extracting Prompts by Inverting LLM Outputs. CoRR abs/2405.15012 (2024) - [i40]Avital Shafran, Roei Schuster, Vitaly Shmatikov:
Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents. CoRR abs/2406.05870 (2024) - [i39]Tingwei Zhang, Collin Zhang, John X. Morris, Eugene Bagdasaryan, Vitaly Shmatikov:
Soft Prompts Go Hard: Steering Visual Language Models with Hidden Meta-Instructions. CoRR abs/2407.08970 (2024) - [i38]Zhen Sun, Vitaly Shmatikov:
Differential Degradation Vulnerabilities in Censorship Circumvention Systems. CoRR abs/2409.06247 (2024) - [i37]Collin Zhang, Tingwei Zhang, Vitaly Shmatikov:
Controlled Generation of Natural Adversarial Documents for Stealthy Retrieval Poisoning. CoRR abs/2410.02163 (2024) - 2023
- [c93]John X. Morris, Volodymyr Kuleshov, Vitaly Shmatikov, Alexander M. Rush:
Text Embeddings Reveal (Almost) As Much As Text. EMNLP 2023: 12448-12460 - [c92]Zhen Sun, Vitaly Shmatikov:
Telepath: A Minecraft-based Covert Communication System. SP 2023: 2223-2237 - [i36]Eugene Bagdasaryan, Vitaly Shmatikov:
Hyperparameter Search Is All You Need For Training-Agnostic Backdoor Robustness. CoRR abs/2302.04977 (2023) - [i35]Eugene Bagdasaryan, Tsung-Yin Hsieh, Ben Nassi, Vitaly Shmatikov:
(Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs. CoRR abs/2307.10490 (2023) - [i34]Eugene Bagdasaryan, Vitaly Shmatikov:
Ceci n'est pas une pomme: Adversarial Illusions in Multi-Modal Embeddings. CoRR abs/2308.11804 (2023) - [i33]John X. Morris, Volodymyr Kuleshov, Vitaly Shmatikov, Alexander M. Rush:
Text Embeddings Reveal (Almost) As Much As Text. CoRR abs/2310.06816 (2023) - [i32]John X. Morris, Wenting Zhao, Justin T. Chiu, Vitaly Shmatikov, Alexander M. Rush:
Language Model Inversion. CoRR abs/2311.13647 (2023) - 2022
- [c91]Eugene Bagdasaryan, Vitaly Shmatikov:
Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures. SP 2022: 769-786 - [i31]Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov:
Data Isotopes for Data Provenance in DNNs. CoRR abs/2208.13893 (2022) - 2021
- [c90]Eugene Bagdasaryan, Vitaly Shmatikov:
Blind Backdoors in Deep Learning Models. USENIX Security Symposium 2021: 1505-1521 - [c89]Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov:
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion. USENIX Security Symposium 2021: 1559-1575 - [i30]Jialing Pei, Vitaly Shmatikov:
BigFoot: Exploiting and Mitigating Leakage in Encrypted Write-Ahead Logs. CoRR abs/2111.09374 (2021) - [i29]Eugene Bagdasaryan, Vitaly Shmatikov:
Spinning Language Models for Propaganda-As-A-Service. CoRR abs/2112.05224 (2021) - 2020
- [c88]Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, Vitaly Shmatikov:
How To Backdoor Federated Learning. AISTATS 2020: 2938-2948 - [c87]Congzheng Song, Alexander M. Rush, Vitaly Shmatikov:
Adversarial Semantic Collisions. EMNLP (1) 2020: 4198-4210 - [c86]Congzheng Song, Vitaly Shmatikov:
Overlearning Reveals Sensitive Attributes. ICLR 2020 - [c85]Zhen Sun, Roei Schuster, Vitaly Shmatikov:
De-Anonymizing Text by Fingerprinting Language Generation. NeurIPS 2020 - [c84]Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov:
Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning. SP 2020: 1295-1313 - [i28]Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov:
Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning. CoRR abs/2001.04935 (2020) - [i27]Tao Yu, Eugene Bagdasaryan, Vitaly Shmatikov:
Salvaging Federated Learning by Local Adaptation. CoRR abs/2002.04758 (2020) - [i26]Eugene Bagdasaryan, Vitaly Shmatikov:
Blind Backdoors in Deep Learning Models. CoRR abs/2005.03823 (2020) - [i25]Zhen Sun, Roei Schuster, Vitaly Shmatikov:
De-Anonymizing Text by Fingerprinting Language Generation. CoRR abs/2006.09615 (2020) - [i24]Roei Schuster, Congzheng Song, Eran Tromer, Vitaly Shmatikov:
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion. CoRR abs/2007.02220 (2020) - [i23]Congzheng Song, Alexander M. Rush, Vitaly Shmatikov:
Adversarial Semantic Collisions. CoRR abs/2011.04743 (2020)
2010 – 2019
- 2019
- [c83]Congzheng Song, Vitaly Shmatikov:
Auditing Data Provenance in Text-Generation Models. KDD 2019: 196-206 - [c82]Eugene Bagdasaryan, Omid Poursaeed, Vitaly Shmatikov:
Differential Privacy Has Disparate Impact on Model Accuracy. NeurIPS 2019: 15453-15462 - [c81]Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov:
Exploiting Unintended Feature Leakage in Collaborative Learning. IEEE Symposium on Security and Privacy 2019: 691-706 - [i22]Congzheng Song, Vitaly Shmatikov:
Overlearning Reveals Sensitive Attributes. CoRR abs/1905.11742 (2019) - [i21]Eugene Bagdasaryan, Vitaly Shmatikov:
Differential Privacy Has Disparate Impact on Model Accuracy. CoRR abs/1905.12101 (2019) - 2018
- [j13]Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov:
The Tao of Inference in Privacy-Protected Databases. Proc. VLDB Endow. 11(11): 1715-1728 (2018) - [c80]Roei Schuster, Vitaly Shmatikov, Eran Tromer:
Situational Access Control in the Internet of Things. CCS 2018: 1056-1073 - [i20]Congzheng Song, Vitaly Shmatikov:
Fooling OCR Systems with Adversarial Text Images. CoRR abs/1802.05385 (2018) - [i19]Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, Emmett Witchel:
Chiron: Privacy-preserving Machine Learning as a Service. CoRR abs/1803.05961 (2018) - [i18]Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov:
Inference Attacks Against Collaborative Learning. CoRR abs/1805.04049 (2018) - [i17]Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, Vitaly Shmatikov:
How To Backdoor Federated Learning. CoRR abs/1807.00459 (2018) - [i16]Congzheng Song, Vitaly Shmatikov:
The Natural Auditor: How To Tell If Someone Used Your Words To Train Their Model. CoRR abs/1811.00513 (2018) - 2017
- [c79]Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov:
Machine Learning Models that Remember Too Much. CCS 2017: 587-601 - [c78]Ivan Pustogarov, Thomas Ristenpart, Vitaly Shmatikov:
Using Program Analysis to Synthesize Sensor Spoofing Attacks. AsiaCCS 2017: 757-770 - [c77]Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov:
Why Your Encrypted Database Is Not Secure. HotOS 2017: 162-168 - [c76]Reza Shokri, Marco Stronati, Congzheng Song, Vitaly Shmatikov:
Membership Inference Attacks Against Machine Learning Models. IEEE Symposium on Security and Privacy 2017: 3-18 - [c75]Roei Schuster, Vitaly Shmatikov, Eran Tromer:
Beauty and the Burst: Remote Identification of Encrypted Video Streams. USENIX Security Symposium 2017: 1357-1374 - [i15]Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov:
Machine Learning Models that Remember Too Much. CoRR abs/1709.07886 (2017) - [i14]Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov:
Why Your Encrypted Database Is Not Secure. IACR Cryptol. ePrint Arch. 2017: 468 (2017) - [i13]Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov:
The Tao of Inference in Privacy-Protected Databases. IACR Cryptol. ePrint Arch. 2017: 1078 (2017) - 2016
- [j12]Richard McPherson, Amir Houmansadr, Vitaly Shmatikov:
CovertCast: Using Live Streaming to Evade Internet Censorship. Proc. Priv. Enhancing Technol. 2016(3): 212-225 (2016) - [j11]Yuanzhong Xu, Tyler Hunt, Youngjin Kwon, Martin Georgiev, Vitaly Shmatikov, Emmett Witchel:
EARP: Principled Storage, Sharing, and Protection for Mobile Apps. GetMobile Mob. Comput. Commun. 20(3): 29-33 (2016) - [c74]Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. CCS 2016: 1353-1364 - [c73]Sooel Son, Daehyeok Kim, Vitaly Shmatikov:
What Mobile Ads Know About Mobile Users. NDSS 2016 - [c72]Yuanzhong Xu, Tyler Hunt, Youngjin Kwon, Martin Georgiev, Vitaly Shmatikov, Emmett Witchel:
Earp: Principled Storage, Sharing, and Protection for Mobile Apps. NSDI 2016: 627-642 - [c71]Michael J. Wilber, Vitaly Shmatikov, Serge J. Belongie:
Can we still avoid automatic face detection? WACV 2016: 1-9 - [i12]Michael J. Wilber, Vitaly Shmatikov, Serge J. Belongie:
Can we still avoid automatic face detection? CoRR abs/1602.04504 (2016) - [i11]Martin Georgiev, Vitaly Shmatikov:
Gone in Six Characters: Short URLs Considered Harmful for Cloud Services. CoRR abs/1604.02734 (2016) - [i10]Lorrie Faith Cranor, Tal Rabin, Vitaly Shmatikov, Salil P. Vadhan, Daniel J. Weitzner:
Towards a Privacy Research Roadmap for the Computing Community. CoRR abs/1604.03160 (2016) - [i9]Richard McPherson, Reza Shokri, Vitaly Shmatikov:
Defeating Image Obfuscation with Deep Learning. CoRR abs/1609.00408 (2016) - [i8]Reza Shokri, Marco Stronati, Vitaly Shmatikov:
Membership Inference Attacks against Machine Learning Models. CoRR abs/1610.05820 (2016) - [i7]Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. IACR Cryptol. ePrint Arch. 2016: 920 (2016) - 2015
- [c70]Reza Shokri, Vitaly Shmatikov:
Privacy-preserving deep learning. Allerton 2015: 909-910 - [c69]Reza Shokri, Vitaly Shmatikov:
Privacy-Preserving Deep Learning. CCS 2015: 1310-1321 - [c68]Martin Georgiev, Suman Jana, Vitaly Shmatikov:
Rethinking Security of Web-Based System Applications. WWW 2015: 366-376 - [c67]Richard McPherson, Suman Jana, Vitaly Shmatikov:
No Escape From Reality: Security and Privacy of Augmented Reality Browsers. WWW 2015: 743-753 - 2014
- [c66]Martin Georgiev, Suman Jana, Vitaly Shmatikov:
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks. NDSS 2014 - [c65]Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov:
No Direction Home: The True Cost of Routing Around Decoys. NDSS 2014 - [c64]Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov:
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking. Privacy Enhancing Technologies 2014: 1-20 - [c63]Chad Brubaker, Suman Jana, Baishakhi Ray, Sarfraz Khurshid, Vitaly Shmatikov:
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. IEEE Symposium on Security and Privacy 2014: 114-129 - 2013
- [c62]Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov:
Diglossia: detecting code injection attacks with precision and efficiency. CCS 2013: 1181-1192 - [c61]Aaron Johnson, Vitaly Shmatikov:
Privacy-preserving data exploration in genome-wide association studies. KDD 2013: 1079-1087 - [c60]Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov:
Fix Me Up: Repairing Access-Control Bugs in Web Applications. NDSS 2013 - [c59]Sooel Son, Vitaly Shmatikov:
The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites. NDSS 2013 - [c58]Sangmin Lee, Edmund L. Wong, Deepak Goel, Mike Dahlin, Vitaly Shmatikov:
πBox: A Platform for Privacy-Preserving Apps. NSDI 2013: 501-514 - [c57]Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov:
The Parrot Is Dead: Observing Unobservable Network Communications. IEEE Symposium on Security and Privacy 2013: 65-79 - [c56]Suman Jana, Arvind Narayanan, Vitaly Shmatikov:
A Scanner Darkly: Protecting User Privacy from Perceptual Applications. IEEE Symposium on Security and Privacy 2013: 349-363 - 2012
- [c55]Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, Vitaly Shmatikov:
The most dangerous code in the world: validating SSL certificates in non-browser software. CCS 2012: 38-49 - [c54]Alan M. Dunn, Michael Z. Lee, Suman Jana, Sangman Kim, Mark Silberstein, Yuanzhong Xu, Vitaly Shmatikov, Emmett Witchel:
Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. OSDI 2012: 61-75 - [c53]Suman Jana, Vitaly Shmatikov:
Abusing File Processing in Malware Detectors for Fun and Profit. IEEE Symposium on Security and Privacy 2012: 80-94 - [c52]Suman Jana, Vitaly Shmatikov:
Memento: Learning Secrets from Process Footprints. IEEE Symposium on Security and Privacy 2012: 143-157 - 2011
- [j10]Vitaly Shmatikov:
Anonymity is not privacy: technical perspective. Commun. ACM 54(12): 132 (2011) - [c51]Edmund L. Wong, Vitaly Shmatikov:
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing. DSN 2011: 233-244 - [c50]Suman Jana, Vitaly Shmatikov:
EVE: Verifying Correct Execution of Cloud-Hosted Web Applications. HotCloud 2011 - [c49]Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov:
RoleCast: finding missing security checks when you do not know what checks are. OOPSLA 2011: 1069-1084 - [c48]Sooel Son, Vitaly Shmatikov:
SAFERPHP: finding semantic vulnerabilities in PHP applications. PLAS 2011: 8 - [c47]Varun Srivastava, Michael D. Bond, Kathryn S. McKinley, Vitaly Shmatikov:
A security policy oracle: detecting security holes using multiple API implementations. PLDI 2011: 343-354 - [c46]Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov:
"You Might Also Like: " Privacy Risks of Collaborative Filtering. IEEE Symposium on Security and Privacy 2011: 231-246 - [c45]Suman Jana, Donald E. Porter, Vitaly Shmatikov:
TxBox: Building Secure, Efficient Sandboxes with System Transactions. IEEE Symposium on Security and Privacy 2011: 329-344 - [e3]Yan Chen, George Danezis, Vitaly Shmatikov:
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011. ACM 2011, ISBN 978-1-4503-0948-6 [contents] - 2010
- [j9]Arvind Narayanan, Vitaly Shmatikov:
Myths and fallacies of "personally identifiable information". Commun. ACM 53(6): 24-26 (2010) - [c44]Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel:
Airavat: Security and Privacy for MapReduce. NSDI 2010: 297-312 - [c43]Michael D. Bond, Varun Srivastava, Kathryn S. McKinley, Vitaly Shmatikov:
Efficient, context-sensitive detection of real-world semantic attacks. PLAS 2010: 1 - [c42]Sooel Son, Vitaly Shmatikov:
The Hitchhiker's Guide to DNS Cache Poisoning. SecureComm 2010: 466-483 - [e2]Ehab Al-Shaer, Angelos D. Keromytis, Vitaly Shmatikov:
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010. ACM 2010, ISBN 978-1-4503-0245-6 [contents]
2000 – 2009
- 2009
- [c41]Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sriram Sankaranarayanan, Vitaly Shmatikov:
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities. CSF 2009: 186-199 - [c40]Justin Brickell, Vitaly Shmatikov:
Privacy-Preserving Classifier Learning. Financial Cryptography 2009: 128-147 - [c39]Arvind Narayanan, Vitaly Shmatikov:
De-anonymizing Social Networks. SP 2009: 173-187 - [i6]Arvind Narayanan, Vitaly Shmatikov:
De-anonymizing Social Networks. CoRR abs/0903.3276 (2009) - 2008
- [c38]Justin Brickell, Vitaly Shmatikov:
The cost of privacy: destruction of data-mining utility in anonymized data publishing. KDD 2008: 70-78 - [c37]Arvind Narayanan, Vitaly Shmatikov:
Robust De-anonymization of Large Sparse Datasets. SP 2008: 111-125 - [c36]Somesh Jha, Louis Kruger, Vitaly Shmatikov:
Towards Practical Privacy for Genomic Computation. SP 2008: 216-230 - [e1]Vitaly Shmatikov:
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008. ACM 2008, ISBN 978-1-60558-288-7 [contents] - 2007
- [c35]Vitaly Shmatikov, Ming-Hsiu Wang:
Secure Verification of Location Claims with Simultaneous Distance Modification. ASIAN 2007: 181-195 - [c34]Justin Brickell, Donald E. Porter, Vitaly Shmatikov, Emmett Witchel:
Privacy-preserving remote diagnostics. CCS 2007: 498-507 - [c33]Prateek Gupta, Vitaly Shmatikov:
Security Analysis of Voice-over-IP Protocols. CSF 2007: 49-63 - [c32]Stanislaw Jarecki, Vitaly Shmatikov:
Efficient Two-Party Secure Computation on Committed Inputs. EUROCRYPT 2007: 97-114 - [c31]Ajay Mahimkar, Jasraj Dange, Vitaly Shmatikov, Harrick M. Vin, Yin Zhang:
dFence: Transparent Network-based Denial of Service Mitigation. NSDI 2007 - [c30]Edmund L. Wong, Praveen Balasubramanian, Lorenzo Alvisi, Mohamed G. Gouda, Vitaly Shmatikov:
Truth in advertising: lightweight verification of route integrity. PODC 2007: 147-156 - [c29]Vitaly Shmatikov, Ming-Hsiu Wang:
Security against probe-response attacks in collaborative intrusion detection. LSAD@SIGCOMM 2007: 129-136 - 2006
- [j8]Gethin Norman, Vitaly Shmatikov:
Analysis of probabilistic contract signing. J. Comput. Secur. 14(6): 561-589 (2006) - [c28]Vitaly Shmatikov, Ming-Hsiu Wang:
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. ESORICS 2006: 18-33 - [c27]Justin Brickell, Vitaly Shmatikov:
Efficient anonymity-preserving data collection. KDD 2006: 76-85 - [c26]Phillip A. Porras, Vitaly Shmatikov:
Large-scale collection and sanitization of network security data: risks and challenges. NSPW 2006: 57-64 - [c25]Vitaly Shmatikov, Ming-Hsiu Wang:
Measuring relationship anonymity in mix networks. WPES 2006: 59-62 - [i5]Arvind Narayanan, Vitaly Shmatikov:
How To Break Anonymity of the Netflix Prize Dataset. CoRR abs/cs/0610105 (2006) - [i4]Prateek Gupta, Vitaly Shmatikov:
Key confirmation and adaptive corruptions in the protocol security logic. IACR Cryptol. ePrint Arch. 2006: 171 (2006) - [i3]Arvind Narayanan, Vitaly Shmatikov:
On the Limits of Point Function Obfuscation. IACR Cryptol. ePrint Arch. 2006: 182 (2006) - [i2]Prateek Gupta, Vitaly Shmatikov:
Security Analysis of Voice-over-IP Protocols. IACR Cryptol. ePrint Arch. 2006: 424 (2006) - 2005
- [j7]Vitaly Shmatikov, Carolyn L. Talcott:
Reputation-based trust management. J. Comput. Secur. 13(1): 167-190 (2005) - [j6]Jonathan K. Millen, Vitaly Shmatikov:
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. J. Comput. Secur. 13(3): 515-564 (2005) - [j5]Jonathan K. Millen, Vitaly Shmatikov:
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. J. Comput. Secur. 13(4): 695- (2005) - [j4]Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov:
Contract signing, optimism, and advantage. J. Log. Algebraic Methods Program. 64(2): 189-218 (2005) - [c24]Justin Brickell, Vitaly Shmatikov:
Privacy-Preserving Graph Algorithms in the Semi-honest Model. ASIACRYPT 2005: 236-252 - [c23]Prateek Gupta, Vitaly Shmatikov:
Towards computationally sound symbolic analysis of key exchange protocols. FMSE 2005: 23-32 - [c22]Arvind Narayanan, Vitaly Shmatikov:
Obfuscated databases and group privacy. CCS 2005: 102-111 - [c21]Arvind Narayanan, Vitaly Shmatikov:
Fast dictionary attacks on passwords using time-space tradeoff. CCS 2005: 364-372 - [c20]Ajay Mahimkar, Vitaly Shmatikov:
Game-Based Analysis of Denial-of-Service Prevention Protocols. CSFW 2005: 287-301 - [c19]Stanislaw Jarecki, Vitaly Shmatikov:
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. Financial Cryptography 2005: 172-187 - [c18]Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani:
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. ICALP 2005: 16-29 - [i1]Prateek Gupta, Vitaly Shmatikov:
Towards computationally sound symbolic analysis of key exchange protocols. IACR Cryptol. ePrint Arch. 2005: 171 (2005) - 2004
- [j3]Dominic J. D. Hughes, Vitaly Shmatikov:
Information Hiding, Anonymity and Privacy: a Modular Approach. J. Comput. Secur. 12(1): 3-36 (2004) - [j2]Vitaly Shmatikov:
Probabilistic analysis of an anonymity system. J. Comput. Secur. 12(3-4): 355-377 (2004) - [c17]Vitaly Shmatikov:
Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation. ESOP 2004: 355-369 - [c16]Stanislaw Jarecki, Vitaly Shmatikov:
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. EUROCRYPT 2004: 590-608 - [c15]Roger Dingledine, Vitaly Shmatikov, Paul F. Syverson:
Synchronous Batching: From Cascades to Free Routes. Privacy Enhancing Technologies 2004: 186-206 - [c14]Patrick Lincoln, Phillip A. Porras, Vitaly Shmatikov:
Privacy-Preserving Sharing and Correlation of Security Alerts. USENIX Security Symposium 2004: 239-254 - 2003
- [c13]Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov:
Contract Signing, Optimism, and Advantage. CONCUR 2003: 361-377 - [c12]Jonathan K. Millen, Vitaly Shmatikov:
Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. CSFW 2003: 47-61 - [c11]Hubert Comon-Lundh, Vitaly Shmatikov:
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or. LICS 2003: 271- - 2002
- [j1]Vitaly Shmatikov, John C. Mitchell:
Finite-state analysis of two contract signing protocols. Theor. Comput. Sci. 283(2): 419-450 (2002) - [c10]Vitaly Shmatikov:
Probabilistic Analysis of Anonymity. CSFW 2002: 119-128 - [c9]Gethin Norman, Vitaly Shmatikov:
Analysis of Probabilistic Contract Signing. FASec 2002: 81-96 - [c8]Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov:
Negotiated Privacy: (Extended Abstract). ISSS 2002: 96-111 - 2001
- [c7]Jonathan K. Millen, Vitaly Shmatikov:
Constraint solving for bounded-process cryptographic protocol analysis. CCS 2001: 166-175 - 2000
- [b1]Vitaly Shmatikov:
Finite-state analysis of security protocols. Stanford University, USA, 2000 - [c6]Vitaly Shmatikov, John C. Mitchell:
Analysis of Abuse-Free Contract Signing. Financial Cryptography 2000: 174-191 - [c5]Vitaly Shmatikov, John C. Mitchell:
Analysis of a Fair Exchange Protocol. NDSS 2000
1990 – 1999
- 1999
- [c4]Viviana Bono, Amit Patel, Vitaly Shmatikov:
A Core Calculus of Classes and Mixins. ECOOP 1999: 43-66 - [c3]Viviana Bono, John C. Mitchell, Amit Patel, Vitaly Shmatikov:
A Core Calculus of Classes and Objects. MFPS 1999: 28-49 - 1998
- [c2]Vitaly Shmatikov, Ulrich Stern:
Efficient Finite-State Analysis for Large Security Protocols. CSFW 1998: 106-115 - [c1]John C. Mitchell, Vitaly Shmatikov, Ulrich Stern:
Finite-State Analysis of SSL 3.0. USENIX Security Symposium 1998
Coauthor Index
aka: Eugene Bagdasaryan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint