


Остановите войну!
for scientists:


default search action
John C. Mitchell
Person information

- affiliation: Stanford University, Department of Computer Science
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c167]Charis Charitsis
, Chris Piech
, John C. Mitchell
:
Detecting the Reasons for Program Decomposition in CS1 and Evaluating Their Impact. SIGCSE (1) 2023: 1014-1020 - 2022
- [c166]Charis Charitsis, Chris Piech, John C. Mitchell
:
Function Names: Quantifying the Relationship Between Identifiers and Their Functionality to Improve Them. L@S 2022: 93-101 - [c165]Charis Charitsis, Chris Piech, John C. Mitchell
:
Using NLP to Quantify Program Decomposition in CS1. L@S 2022: 113-120 - [c164]Charis Charitsis, Chris Piech, John C. Mitchell
:
Feedback on Program Development Process for CS1 Students. SIGCSE (2) 2022: 1150 - [i23]Maxwell Bigman, Yosefa Gilon, Jenny Han, John C. Mitchell:
Insights for post-pandemic pedagogy across one CS department. CoRR abs/2203.09050 (2022) - [i22]Sam Blackshear, John C. Mitchell, Todd Nowacki, Shaz Qadeer:
The Move Borrow Checker. CoRR abs/2205.05181 (2022) - 2021
- [c163]Charis Charitsis, Chris Piech, John C. Mitchell
:
Assessing Function Names and Quantifying the Relationship Between Identifiers and Their Functionality to Improve Them. L@S 2021: 291-294 - 2020
- [c162]Max DiGiacomo-Castillo, Yiyun Liang, Advay Pal, John C. Mitchell
:
Model Checking Bitcoin and other Proof-of-Work Consensus Protocols. Blockchain 2020: 351-358 - [c161]Jonathan Bassen, Bharathan Balaji, Michael Schaarschmidt, Candace Thille, Jay Painter, Dawn Zimmaro, Alex Games, Ethan Fast, John C. Mitchell
:
Reinforcement Learning for the Adaptive Scheduling of Educational Activities. CHI 2020: 1-12 - [c160]Maxwell Bigman, John C. Mitchell:
Teaching Online in 2020: Experiments, Empathy, Discovery. LWMOOCS 2020: 156-161 - [i21]Sam Blackshear, David L. Dill, Shaz Qadeer, Clark W. Barrett, John C. Mitchell, Oded Padon, Yoni Zohar:
Resources: A Safe Language Abstraction for Money. CoRR abs/2004.05106 (2020) - [i20]Max DiGiacomo-Castillo, Yiyun Liang, Advay Pal, John C. Mitchell:
Model Checking Bitcoin and other Proof-of-Work Consensus Protocols. CoRR abs/2007.08644 (2020)
2010 – 2019
- 2019
- [j51]Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell
, Andre Scedrov, Benedikt Schmidt:
Automated Analysis of Cryptographic Assumptions in Generic Group Models. J. Cryptol. 32(2): 324-360 (2019) - 2018
- [c159]Avradip Mandal, John C. Mitchell
, Hart Montgomery, Arnab Roy:
Data Oblivious Genome Variants Search on Intel SGX. DPM/CBT@ESORICS 2018: 296-310 - [c158]Jonathan Bassen, Iris Howley, Ethan Fast, John C. Mitchell, Candace Thille:
OARS: exploring instructor analytics for online learning. L@S 2018: 55:1-55:10 - [i19]Eftychios Theodorakis, John C. Mitchell:
Semantic Security Invariance under Variant Computational Assumptions. IACR Cryptol. ePrint Arch. 2018: 51 (2018) - [i18]Avradip Mandal, John C. Mitchell, Hart Montgomery, Arnab Roy:
Data Oblivious Genome Variants Search on Intel SGX. IACR Cryptol. ePrint Arch. 2018: 732 (2018) - 2017
- [j50]Daniel B. Giffin, Amit Levy
, Deian Stefan, David Terei, David Mazières, John C. Mitchell
, Alejandro Russo:
Hails: Protecting data privacy in untrusted web applications. J. Comput. Secur. 25(4-5): 427-461 (2017) - [j49]Deian Stefan, David Mazières, John C. Mitchell
, Alejandro Russo:
Flexible dynamic information flow control in the presence of exceptions. J. Funct. Program. 27: e5 (2017) - [c157]Avradip Mandal, John C. Mitchell, Hart William Montgomery, Arnab Roy:
Privacy for targeted advertising. CNS 2017: 438-443 - [i17]Avradip Mandal, John C. Mitchell, Hart William Montgomery, Arnab Roy:
Privacy for Targeted Advertising. IACR Cryptol. ePrint Arch. 2017: 658 (2017) - 2016
- [j48]Jonathan R. Mayer, Patrick Mutchler, John C. Mitchell
:
Evaluating the privacy properties of telephone metadata. Proc. Natl. Acad. Sci. USA 113(20): 5536-5541 (2016) - [c156]David J. Wu, Joe Zimmerman, Jérémy Planul, John C. Mitchell:
Privacy-Preserving Shortest Path Computation. NDSS 2016 - [c155]Patrick Mutchler, Yeganeh Safaei, Adam Doupé, John C. Mitchell
:
Target Fragmentation in Android Apps. IEEE Symposium on Security and Privacy Workshops 2016: 204-213 - [c154]Hristo S. Paskov, John C. Mitchell, Trevor J. Hastie:
Data Representation and Compression Using Linear-Programming Approximations. ICLR (Poster) 2016 - [i16]David J. Wu, Joe Zimmerman, Jérémy Planul, John C. Mitchell:
Privacy-Preserving Shortest Path Computation. CoRR abs/1601.02281 (2016) - 2015
- [c153]Stefan Heule, Deian Stefan, Edward Z. Yang, John C. Mitchell, Alejandro Russo:
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control. POST 2015: 11-31 - [c152]Hristo S. Paskov, John C. Mitchell, Trevor J. Hastie:
Fast Algorithms for Learning with Long N-grams via Suffix Tree Based Matrix Multiplication. UAI 2015: 672-681 - [i15]Stefan Heule, Deian Stefan, Edward Z. Yang, John C. Mitchell, Alejandro Russo:
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control (Extended Version). CoRR abs/1501.04132 (2015) - [i14]Anupam Datta, Joseph Y. Halpern, John C. Mitchell, Arnab Roy, Shayak Sen:
A Symbolic Logic with Concrete Bounds for Cryptographic Protocols. CoRR abs/1511.07536 (2015) - 2014
- [j47]Pierre Dillenbourg, Armando Fox, Claude Kirchner, John C. Mitchell, Martin Wirsing:
Massive Open Online Courses: Current State and Perspectives (Dagstuhl Perspectives Workshop 14112). Dagstuhl Manifestos 4(1): 1-27 (2014) - [j46]John C. Mitchell:
MOOCs on and off the Farm: MOOCs and technology to advance learning and learning research (Ubiquity symposium). Ubiquity 2014(June): 1:1-1:10 (2014) - [c151]Hristo S. Paskov, John C. Mitchell, Trevor J. Hastie:
An Efficient Algorithm for Large Scale Compressive Feature Learning. AISTATS 2014: 760-768 - [c150]Elie Bursztein, Angelique Moscicki, Celine Fabry, Steven Bethard, John C. Mitchell, Dan Jurafsky:
Easy does it: more usable CAPTCHAs. CHI 2014: 2637-2646 - [c149]Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov
, Benedikt Schmidt:
Automated Analysis of Cryptographic Assumptions in Generic Group Models. CRYPTO (1) 2014: 95-112 - [c148]John C. Mitchell, Joe Zimmerman:
Data-Oblivious Data Structures. STACS 2014: 554-565 - [c147]Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. Mitchell:
The End is Nigh: Generic Solving of Text-based CAPTCHAs. WOOT 2014 - [i13]Pierre Dillenbourg, Claude Kirchner, John C. Mitchell, Martin Wirsing:
Massively Open Online Courses, Current State and Perspectives (Dagstuhl Perspectives Workshop 14112). Dagstuhl Reports 4(3): 47-61 (2014) - [i12]Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt:
Automated Analysis of Cryptographic Assumptions in Generic Group Models. IACR Cryptol. ePrint Arch. 2014: 458 (2014) - 2013
- [c146]Jérémy Planul, John C. Mitchell
:
Oblivious Program Execution and Path-Sensitive Non-interference. CSF 2013: 66-80 - [c145]Edward Z. Yang, Deian Stefan, John C. Mitchell, David Mazières, Petr Marchenko, Brad Karp:
Toward Principled Browser Security. HotOS 2013 - [c144]Hristo S. Paskov, Robert West, John C. Mitchell, Trevor J. Hastie:
Compressive Feature Learning. NIPS 2013: 2931-2939 - [c143]Ellick Chan, Peifung E. Lam, John C. Mitchell:
Understanding the Challenges with Medical Data Segmentation for Privacy. HealthTech 2013 - [e6]David A. Basin, John C. Mitchell:
Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Lecture Notes in Computer Science 7796, Springer 2013, ISBN 978-3-642-36829-5 [contents] - 2012
- [j45]Carl E. Landwehr, Dan Boneh, John C. Mitchell
, Steven M. Bellovin, Susan Landau, Michael E. Lesk:
Privacy and Cybersecurity: The Next 100 Years. Proc. IEEE 100(Centennial-Issue): 1659-1673 (2012) - [j44]Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett
:
A Learning-Based Approach to Reactive Security. IEEE Trans. Dependable Secur. Comput. 9(4): 482-493 (2012) - [c142]John C. Mitchell
, Rahul Sharma, Deian Stefan, Joe Zimmerman:
Information-Flow Control for Programming on Encrypted Data. CSF 2012: 45-60 - [c141]Deian Stefan, Alejandro Russo, Pablo Buiras, Amit Levy
, John C. Mitchell
, David Mazières:
Addressing covert termination and timing channels in concurrent information flow systems. ICFP 2012: 201-214 - [c140]Peifung E. Lam, John C. Mitchell, Andre Scedrov
, Sharada Sundaram, Frank Wang:
Declarative privacy policy: finite models and attribute-based encryption. IHI 2012: 323-332 - [c139]Daniel B. Giffin, Amit Levy, Deian Stefan, David Terei, David Mazières, John C. Mitchell, Alejandro Russo:
Hails: Protecting Data Privacy in Untrusted Web Applications. OSDI 2012: 47-60 - [c138]Jonathan R. Mayer, John C. Mitchell
:
Third-Party Web Tracking: Policy and Technology. IEEE Symposium on Security and Privacy 2012: 413-427 - [c137]Elie Bursztein, Chinmay Soman, Dan Boneh, John C. Mitchell:
SessionJuggler: secure web login from an untrusted terminal using session hijacking. WWW 2012: 321-330 - [i11]Deian Stefan, Alejandro Russo, John C. Mitchell, David Mazières:
Flexible Dynamic Information Flow Control in the Presence of Exceptions. CoRR abs/1207.1457 (2012) - [i10]John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman:
Information-flow control for programming on encrypted data. IACR Cryptol. ePrint Arch. 2012: 205 (2012) - 2011
- [j43]Jason Bau, John C. Mitchell
:
Security Modeling and Analysis. IEEE Secur. Priv. 9(3): 18-25 (2011) - [c136]Elie Bursztein, Matthieu Martin, John C. Mitchell:
Text-based CAPTCHA strengths and weaknesses. CCS 2011: 125-138 - [c135]Elie Bursztein, Baptiste Gourdin, John C. Mitchell:
Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs. ESORICS 2011: 133-149 - [c134]Alex Bain, John C. Mitchell
, Rahul Sharma, Deian Stefan, Joe Zimmerman:
A Domain-Specific Language for Computing on Encrypted Data (Invited Talk). FSTTCS 2011: 6-24 - [c133]Deian Stefan, Alejandro Russo, John C. Mitchell
, David Mazières:
Flexible dynamic information flow control in Haskell. Haskell 2011: 95-106 - [c132]Timothy L. Hinrichs, William C. Garrison III, Adam J. Lee, Skip Saunders, John C. Mitchell:
TBA : A Hybrid of Logic and Extensional Access Control Systems. Formal Aspects in Security and Trust 2011: 198-213 - [c131]Deian Stefan, Alejandro Russo, David Mazières, John C. Mitchell:
Disjunction Category Labels. NordSec 2011: 223-239 - [c130]John C. Mitchell:
Program Analysis for Web Security. SAS 2011: 4 - [c129]Elie Bursztein, Romain Beauxis, Hristo S. Paskov, Daniele Perito, Celine Fabry, John C. Mitchell
:
The Failure of Noise-Based Non-continuous Audio Captchas. IEEE Symposium on Security and Privacy 2011: 19-31 - [c128]Ankur Taly, Úlfar Erlingsson, John C. Mitchell
, Mark S. Miller, Jasvir Nagra:
Automated Analysis of Security-Critical JavaScript APIs. IEEE Symposium on Security and Privacy 2011: 363-378 - [c127]John C. Mitchell:
A Symbolic Logic with Exact Bounds for Cryptographic Protocols. WoLLIC 2011: 3 - [p3]Anupam Datta, John C. Mitchell, Arnab Roy, Stephan Hyeonjun Stiller:
Protocol Composition Logic. Formal Models and Techniques for Analyzing Security Protocols 2011: 182-221 - [i9]Alex Bain, John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman:
A Domain-Specific Language for Computing on Encrypted Data. IACR Cryptol. ePrint Arch. 2011: 561 (2011) - 2010
- [j42]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
:
Inductive trace properties for computational security. J. Comput. Secur. 18(6): 1035-1073 (2010) - [c126]Devdatta Akhawe, Adam Barth, Peifung E. Lam, John C. Mitchell
, Dawn Song:
Towards a Formal Foundation of Web Security. CSF 2010: 290-304 - [c125]Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett
:
A Learning-Based Approach to Reactive Security. Financial Cryptography 2010: 192-206 - [c124]Jason Bau, John C. Mitchell:
A Security Evaluation of DNSSEC with NSEC3. NDSS 2010 - [c123]Sergio Maffeis
, John C. Mitchell
, Ankur Taly:
Object Capabilities and Isolation of Untrusted Web Applications. IEEE Symposium on Security and Privacy 2010: 125-140 - [c122]Jason Bau, Elie Bursztein, Divij Gupta, John C. Mitchell
:
State of the Art: Automated Black-Box Web Application Vulnerability Testing. IEEE Symposium on Security and Privacy 2010: 332-345 - [c121]Elie Bursztein, Steven Bethard, Celine Fabry, John C. Mitchell
, Daniel Jurafsky:
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation. IEEE Symposium on Security and Privacy 2010: 399-413 - [c120]Linda Briesemeister, Steven Dawson, Patrick Lincoln, Hassen Saïdi, Jim Thornton, Glenn Durfee, Peter C. S. Kwan, Elizabeth Stinson, Adam J. Oliner, John C. Mitchell:
Homogeneity as an Advantage: It Takes a Community to Protect an Application. CollSec 2010 - [c119]Elie Bursztein, Baptiste Gourdin, Celine Fabry, Jason Bau, Gustav Rydstedt, Hristo Bojinov, Dan Boneh, John C. Mitchell:
Webseclab Security Education Workbench. CSET 2010 - [c118]Anupam Datta, Nipun Dave, John C. Mitchell, Helen Nissenbaum, Divya Sharma:
Privacy Challenges in Patient-centric Health Information Systems. HealthSec 2010 - [i8]Jason Bau, John C. Mitchell:
A Security Evaluation of DNSSEC with NSEC3. IACR Cryptol. ePrint Arch. 2010: 115 (2010)
2000 – 2009
- 2009
- [j41]Adam Barth, Collin Jackson, John C. Mitchell
:
Securing frame communication in browsers. Commun. ACM 52(6): 83-91 (2009) - [c117]Elie Bursztein, Peifung E. Lam, John C. Mitchell:
TrackBack spam: abuse and prevention. CCSW 2009: 3-10 - [c116]Elie Bursztein, John C. Mitchell:
Using Strategy Objectives for Network Security Analysis. Inscrypt 2009: 337-349 - [c115]Sergio Maffeis
, John C. Mitchell, Ankur Taly:
Isolating JavaScript with Filters, Rewriting, and Wrappers. ESORICS 2009: 505-522 - [c114]Timothy L. Hinrichs, Natasha Gude, Martín Casado, John C. Mitchell, Scott Shenker
:
Practical declarative network management. WREN 2009: 1-10 - [c113]Peifung E. Lam, John C. Mitchell, Sharada Sundaram:
A Formalization of HIPAA for a Medical Messaging System. TrustBus 2009: 73-85 - [e5]Ruth Breu, John C. Mitchell, Janos Sztipanovits, Alfred Winter:
Model-Based Design of Trustworthy Health Information Systems, 11.02. - 14.02.2009. Dagstuhl Seminar Proceedings 09073, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2009 [contents] - [i7]Ruth Breu, John C. Mitchell, Janos Sztipanovits, Alfred Winter:
09073 Abstracts Collection - Model-Based Design of Trustworthy Health Information Systems. Model-Based Design of Trustworthy Health Information Systems 2009 - [i6]Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Xiaodong Song, Peter L. Bartlett:
A Learning-Based Approach to Reactive Security. CoRR abs/0912.1155 (2009) - 2008
- [j40]Ralf Küsters, Anupam Datta, John C. Mitchell
, Ajith Ramanathan:
On the Relationships between Notions of Simulation-Based Security. J. Cryptol. 21(4): 492-546 (2008) - [c112]John C. Mitchell, Arnab Roy, Paul D. Rowe, Andre Scedrov
:
Analysis of EAP-GPSK Authentication Protocol. ACNS 2008: 309-327 - [c111]Sergio Maffeis
, John C. Mitchell, Ankur Taly:
An Operational Semantics for JavaScript. APLAS 2008: 307-325 - [c110]Adam Barth, Collin Jackson, John C. Mitchell:
Robust defenses for cross-site request forgery. CCS 2008: 75-88 - [c109]Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell:
A Layered Architecture for Detecting Malicious Behaviors. RAID 2008: 78-97 - [c108]Adam Barth, Collin Jackson, John C. Mitchell:
Securing Frame Communication in Browsers. USENIX Security Symposium 2008: 17-30 - [c107]Elizabeth Stinson, John C. Mitchell:
Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods. WOOT 2008 - [c106]John C. Mitchell
, Arnab Roy, Mukund Sundararajan:
An Automated Approach for Proving PCL Invariants. SecReT@LICS/CSF 2008: 93-113 - [p2]Elizabeth Stinson, John C. Mitchell:
Characterizing Bots' Remote Control Behavior. Botnet Detection 2008: 45-64 - 2007
- [c105]Adam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram:
Privacy and Utility in Business Processes. CSF 2007: 279-294 - [c104]Elizabeth Stinson, John C. Mitchell:
Characterizing Bots' Remote Control Behavior. DIMVA 2007: 89-108 - [c103]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive Proofs of Computational Secrecy. ESORICS 2007: 219-234 - [c102]Arnab Roy, Anupam Datta, John C. Mitchell:
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. TGC 2007: 312-329 - [c101]Collin Jackson, Dan Boneh, John C. Mitchell:
Transaction Generators: Root Kits for Web. HotSec 2007 - [c100]Anupam Datta, Ante Derek, John C. Mitchell
, Arnab Roy:
Protocol Composition Logic (PCL). Computation, Meaning, and Logic 2007: 311-358 - [i5]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive Proof Method for Computational Secrecy. IACR Cryptol. ePrint Arch. 2007: 165 (2007) - 2006
- [j39]Ninghui Li, John C. Mitchell:
Understanding SPKI/SDSI using first-order logic. Int. J. Inf. Sec. 5(1): 48-64 (2006) - [j38]John C. Mitchell
, Ajith Ramanathan, Andre Scedrov
, Vanessa Teague:
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theor. Comput. Sci. 353(1-3): 118-164 (2006) - [j37]Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell
, Mathieu Turuani:
Compositional analysis of contract-signing protocols. Theor. Comput. Sci. 367(1-2): 33-56 (2006) - [c99]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert:
Secrecy Analysis in Protocol Composition Logic. ASIAN 2006: 197-213 - [c98]Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi:
Computationally Sound Compositional Logic for Key Exchange Protocols. CSFW 2006: 321-334 - [c97]Adam Barth, John C. Mitchell:
Managing Digital Rights using Linear Logic. LICS 2006: 127-136 - [c96]Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum:
Privacy and Contextual Integrity: Framework and Applications. IEEE Symposium on Security and Privacy 2006: 184-198 - [c95]Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
:
Games and the Impossibility of Realizable Ideal Functionality. TCC 2006: 360-379 - [c94]Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell:
Protecting browser state from web privacy attacks. WWW 2006: 737-744 - [i4]Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi:
Key Exchange Protocols: Security Definition, Proof Method and Applications. IACR Cryptol. ePrint Arch. 2006: 56 (2006) - [i3]Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security. IACR Cryptol. ePrint Arch. 2006: 153 (2006) - [i2]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive Trace Properties for Computational Security. IACR Cryptol. ePrint Arch. 2006: 486 (2006) - 2005
- [j36]Ninghui Li, John C. Mitchell, William H. Winsborough:
Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3): 474-514 (2005) - [j35]Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
:
A derivation system and compositional logic for security protocols. J. Comput. Secur. 13(3): 423-482 (2005) - [j34]Rohit Chadha, John C. Mitchell
, Andre Scedrov
, Vitaly Shmatikov:
Contract signing, optimism, and advantage. J. Log. Algebraic Methods Program. 64(2): 189-218 (2005) - [c93]Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell:
A modular correctness proof of IEEE 802.11i and TLS. CCS 2005: 2-15 - [c92]Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani:
Compositional Analysis of Contract Signing Protocols. CSFW 2005: 94-110 - [c91]Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani:
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. ICALP 2005: 16-29 - [c90]Changhua He, John C. Mitchell:
Security Analysis and Improvements for IEEE 802.11i. NDSS 2005 - [c89]Adam Barth, John C. Mitchell:
Enterprise privacy promises and enforcement. WITS 2005: 58-66 - [c88]John C. Mitchell:
Security analysis of network protocols: logical and computational methods. PPDP 2005: 151-152 - [c87]Anupam Datta, Ralf Küsters,