Seuraa
John C Mitchell
John C Mitchell
Professor of Computer Science, Stanford University
Vahvistettu sähköpostiosoite verkkotunnuksessa Stanford.edu
Nimike
Viittaukset
Viittaukset
Vuosi
Design of a role-based trust-management framework
N Li, JC Mitchell, WH Winsborough
Proceedings 2002 IEEE Symposium on Security and Privacy, 114-130, 2002
11152002
Architectural support for copy and tamper resistant software
D Lie, C Thekkath, M Mitchell, P Lincoln, D Boneh, J Mitchell, M Horowitz
Acm Sigplan Notices 35 (11), 168-177, 2000
10432000
Foundations for programming languages
JC Mitchell
MIT press, 1996
9071996
Automated analysis of cryptographic protocols using mur/spl phi
JC Mitchell, M Mitchell, U Stern
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
7701997
Abstract types have existential type
JC Mitchell, GD Plotkin
ACM Transactions on Programming Languages and Systems (TOPLAS) 10 (3), 470-502, 1988
7591988
Third-party web tracking: Policy and technology
JR Mayer, JC Mitchell
IEEE Symp Security and Privacy, 413-427, 2012
7152012
Client-side defense against web-based identity theft
N Chou, L Robert, Y Teraguchi, JC Mitchell
Network and Distributed Systems Security (NDSS), 2004
684*2004
Robust defenses for cross-site request forgery
A Barth, C Jackson, JC Mitchell
Proc ACM Conf on Computer and Communications Security, 75-88, 2008
6382008
Distributed credential chain discovery in trust management
N Li, WH Winsborough, JC Mitchell
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
5812001
Stronger Password Authentication Using Browser Extensions.
B Ross, C Jackson, N Miyake, D Boneh, JC Mitchell
USENIX Security Symposium 17, 32, 2005
5592005
Privacy and contextual integrity: Framework and applications
A Barth, A Datta, JC Mitchell, H Nissenbaum
2006 IEEE symposium on security and privacy (S&P'06), 15 pp.-198, 2006
5582006
State of the art: Automated black-box web application vulnerability testing
J Bau, E Bursztein, D Gupta, JC Mitchell
IEEE Symposium on Security and Privacy, 332-345, 2010
4862010
Text-based CAPTCHA strengths and weaknesses
E Bursztein, M Martin, J Mitchell
Proceedings of the 18th ACM conference on Computer and communications …, 2011
4642011
F-bounded polymorphism for object-oriented programming
P Canning, W Cook, W Hill, W Olthoff, JC Mitchell
Proceedings of the fourth international conference on functional programming …, 1989
4121989
Type systems for programming languages
JC Mitchell
Formal Models and Semantics, 365-458, 1990
4071990
Decision problems for propositional linear logic
P Lincoln, J Mitchell, A Scedrov, N Shankar
Annals of pure and applied logic 56 (1-3), 239-311, 1992
3981992
Practical declarative network management
TL Hinrichs, NS Gude, M Casado, JC Mitchell, S Shenker
Proceedings of the 1st ACM workshop on Research on enterprise networking, 1-10, 2009
3862009
Undecidability of bounded security protocols
J Mitchell, A Scedrov, N Durgin, P Lincoln
Workshop on formal methods and security protocols, 1999
3781999
A meta-notation for protocol analysis
I Cervesato, NA Durgin, PD Lincoln, JC Mitchell, A Scedrov
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 55-69, 1999
3751999
Security Analysis and Improvements for IEEE 802.11 i
C Mitchell, C He
The 12th Annual Network and Distributed System Security Symposium (NDSS'05 …, 2005
3692005
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20