Ikuti
John C Mitchell
John C Mitchell
Professor of Computer Science, Stanford University
Email yang diverifikasi di Stanford.edu
Judul
Dikutip oleh
Dikutip oleh
Tahun
TRNSYS 17: A transient system simulation program, solar energy laboratory
SA Klein, WA Beckman, JW Mitchell, JA Duffie, NA Duffie, TL Freeman, ...
Madison, Madison, USA: University of Wisconsin, 2010
1647*2010
Design of a role-based trust-management framework
N Li, JC Mitchell, WH Winsborough
Proceedings 2002 IEEE Symposium on Security and Privacy, 114-130, 2002
11152002
Architectural support for copy and tamper resistant software
D Lie, C Thekkath, M Mitchell, P Lincoln, D Boneh, J Mitchell, M Horowitz
Acm Sigplan Notices 35 (11), 168-177, 2000
10722000
Foundations for programming languages
JC Mitchell
MIT press, 1996
10001996
Third-party web tracking: Policy and technology
JR Mayer, JC Mitchell
IEEE Symp Security and Privacy, 413-427, 2012
8202012
Abstract types have existential type
JC Mitchell, GD Plotkin
ACM Transactions on Programming Languages and Systems (TOPLAS) 10 (3), 470-502, 1988
7861988
Automated analysis of cryptographic protocols using murphi
JC Mitchell, M Mitchell, U Stern
Proceedings. 1997 IEEE Symposium on Security and Privacy, 141-151, 1997
7831997
Client-side defense against web-based identity theft
N Chou, R Ledesma, Y Teraguchi, JC Mitchell
Network and Distributed Systems Security (NDSS), 2004
715*2004
Robust defenses for cross-site request forgery
A Barth, C Jackson, JC Mitchell
Proc ACM Conf on Computer and Communications Security, 75-88, 2008
6792008
Privacy and contextual integrity: Framework and applications
A Barth, A Datta, JC Mitchell, H Nissenbaum
2006 IEEE symposium on security and privacy (S&P'06), 15 pp.-198, 2006
6102006
Stronger Password Authentication Using Browser Extensions.
B Ross, C Jackson, N Miyake, D Boneh, JC Mitchell
USENIX Security Symposium 17, 32, 2005
5822005
Distributed credential chain discovery in trust management
N Li, WH Winsborough, JC Mitchell
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
5712001
F-bounded polymorphism for object-oriented programming
P Canning, W Cook, W Hill, W Olthoff, JC Mitchell
Proceedings of the fourth international conference on functional programming …, 1989
549*1989
State of the art: Automated black-box web application vulnerability testing
J Bau, E Bursztein, D Gupta, JC Mitchell
IEEE Symposium on Security and Privacy, 332-345, 2010
5342010
Text-based CAPTCHA strengths and weaknesses
E Bursztein, M Martin, J Mitchell
Proceedings of the 18th ACM conference on Computer and communications …, 2011
4962011
Type systems for programming languages
JC Mitchell
Formal Models and Semantics, 365-458, 1990
4161990
Decision problems for propositional linear logic
P Lincoln, J Mitchell, A Scedrov, N Shankar
Annals of pure and applied logic 56 (1-3), 239-311, 1992
4131992
Practical declarative network management
TL Hinrichs, NS Gude, M Casado, JC Mitchell, S Shenker
Proceedings of the 1st ACM workshop on Research on enterprise networking, 1-10, 2009
4042009
Undecidability of bounded security protocols
N Durgin, P Lincoln, J Mitchell, A Scedrov
Workshop on formal methods and security protocols, 1999
396*1999
A meta-notation for protocol analysis
I Cervesato, NA Durgin, PD Lincoln, JC Mitchell, A Scedrov
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 55-69, 1999
3841999
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20