The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John C. Mitchell: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John C. Mitchell
    The Implication Problem for Functional and Inclusion Dependencies [Citation Graph (13, 0)][DBLP]
    Information and Control, 1983, v:56, n:3, pp:154-173 [Journal]
  2. John C. Mitchell
    Inference Rules for Functional and Inclusion Dependencies. [Citation Graph (7, 12)][DBLP]
    PODS, 1983, pp:58-69 [Conf]
  3. Peter S. Canning, William R. Cook, Walter L. Hill, Walter G. Olthoff, John C. Mitchell
    F-Bounded Polymorphism for Object-Oriented Programming. [Citation Graph (6, 0)][DBLP]
    FPCA, 1989, pp:273-280 [Conf]
  4. Cynthia Dwork, Paris C. Kanellakis, John C. Mitchell
    On the Sequential Nature of Unification. [Citation Graph (6, 0)][DBLP]
    J. Log. Program., 1984, v:1, n:1, pp:35-50 [Journal]
  5. Lalita Jategaonkar, John C. Mitchell
    ML with Extended Pattern Matching and Subtypes. [Citation Graph (4, 0)][DBLP]
    LISP and Functional Programming, 1988, pp:198-211 [Conf]
  6. John C. Mitchell, Gordon D. Plotkin
    Abstract Types Have Existential Type. [Citation Graph (4, 0)][DBLP]
    POPL, 1985, pp:37-51 [Conf]
  7. Luca Cardelli, Simone Martini, John C. Mitchell, Andre Scedrov
    An Extension of System F with Subtyping. [Citation Graph (3, 0)][DBLP]
    TACS, 1991, pp:750-770 [Conf]
  8. John C. Mitchell, Gordon D. Plotkin
    Abstract Types Have Existential Type. [Citation Graph (3, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1988, v:10, n:3, pp:470-502 [Journal]
  9. John C. Mitchell
    Toward a Typed Foundation for Method Specialization and Inheritance. [Citation Graph (2, 0)][DBLP]
    POPL, 1990, pp:109-124 [Conf]
  10. Paris C. Kanellakis, Harry G. Mairson, John C. Mitchell
    Unification and ML-Type Reconstruction. [Citation Graph (1, 0)][DBLP]
    Computational Logic - Essays in Honor of Alan Robinson, 1991, pp:444-478 [Conf]
  11. Luca Cardelli, John C. Mitchell
    Operations in Records. [Citation Graph (1, 0)][DBLP]
    Category Theory and Computer Science, 1989, pp:75-81 [Conf]
  12. My Hoang, John C. Mitchell, Ramesh Viswanathan
    Standard ML-NJ weak polymorphism and imperative constructs [Citation Graph (1, 0)][DBLP]
    LICS, 1993, pp:15-25 [Conf]
  13. John C. Mitchell, Furio Honsell, Kathleen Fisher
    A lambda calculus of objects and method specialization [Citation Graph (1, 0)][DBLP]
    LICS, 1993, pp:26-38 [Conf]
  14. Ole Agesen, Stephen N. Freund, John C. Mitchell
    Adding Type Parameterization to the Java Language. [Citation Graph (1, 0)][DBLP]
    OOPSLA, 1997, pp:49-65 [Conf]
  15. Paris C. Kanellakis, John C. Mitchell
    Polymorphic Unification and ML Typing. [Citation Graph (1, 0)][DBLP]
    POPL, 1989, pp:105-115 [Conf]
  16. John C. Mitchell
    Coercion and Type Inference. [Citation Graph (1, 0)][DBLP]
    POPL, 1984, pp:175-185 [Conf]
  17. John C. Mitchell
    Representation Independence and Data Abstraction. [Citation Graph (1, 0)][DBLP]
    POPL, 1986, pp:263-276 [Conf]
  18. John C. Mitchell, Robert Harper
    The Essence of ML. [Citation Graph (1, 0)][DBLP]
    POPL, 1988, pp:28-46 [Conf]
  19. Ninghui Li, John C. Mitchell, Derrick Tong
    Securing Java RMI-Based Distributed Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:262-271 [Conf]
  20. David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz
    Architectural Support for Copy and Tamper Resistant Software. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2000, pp:168-177 [Conf]
  21. John C. Mitchell
    Finite-State Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CAV, 1998, pp:71-76 [Conf]
  22. Michael Backes, Catherine Meadows, John C. Mitchell
    Relating cryptography and formal methods: a panel. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:61-66 [Conf]
  23. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    Secure protocol composition. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:11-23 [Conf]
  24. Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell
    A modular correctness proof of IEEE 802.11i and TLS. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:2-15 [Conf]
  25. Ninghui Li, William H. Winsborough, John C. Mitchell
    Distributed credential chain discovery in trust management: extended abstract. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:156-165 [Conf]
  26. Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov
    A Probabilistic Poly-Time Framework for Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:112-121 [Conf]
  27. Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov
    Contract Signing, Optimism, and Advantage. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2003, pp:361-377 [Conf]
  28. Paulo Mateus, John C. Mitchell, Andre Scedrov
    Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2003, pp:323-345 [Conf]
  29. Stuart A. Kurtz, John C. Mitchell, Michael J. O'Donnell
    Connecting Formal Semantics to Constructive Intuitions. [Citation Graph (0, 0)][DBLP]
    Constructivity in Computer Science, 1991, pp:1-21 [Conf]
  30. Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov
    A Meta-Notation for Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:55-69 [Conf]
  31. Iliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov
    Relating Strands and Multiset Rewriting for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:35-51 [Conf]
  32. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    A Derivation System for Security Protocols and its Logical Formalization. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:109-125 [Conf]
  33. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    Abstraction and Refinement in Protocol Derivation. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:30-0 [Conf]
  34. Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
    Compositional Analysis of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:94-110 [Conf]
  35. Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic
    A Compositional Logic for Protocol Correctness. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:241-0 [Conf]
  36. Ajay Chander, John C. Mitchell, Drew Dean
    A State-Transition Model of Trust Management and Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:27-43 [Conf]
  37. Ninghui Li, John C. Mitchell
    Understanding SPKI/SDSI Using First-Order Logic. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:89-0 [Conf]
  38. Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi
    Computationally Sound Compositional Logic for Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:321-334 [Conf]
  39. John C. Mitchell, Andre Scedrov
    Notes on Sconing and Relators. [Citation Graph (0, 0)][DBLP]
    CSL, 1992, pp:352-378 [Conf]
  40. Ninghui Li, John C. Mitchell
    A Role-based Trust-management Framework. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:201-0 [Conf]
  41. John C. Mitchell
    Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ESOP, 2001, pp:23-29 [Conf]
  42. Vitaly Shmatikov, John C. Mitchell
    Analysis of Abuse-Free Contract Signing. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:174-191 [Conf]
  43. Kathleen Fisher, John C. Mitchell
    A Delegation-based Object Calculus with Subtying. [Citation Graph (0, 0)][DBLP]
    FCT, 1995, pp:42-61 [Conf]
  44. Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov
    Probabilistic Polynomial-Time Equivalence and Security Analysis. [Citation Graph (0, 0)][DBLP]
    World Congress on Formal Methods, 1999, pp:776-793 [Conf]
  45. Patrick Lincoln, John C. Mitchell, Andre Scedrov, Natarajan Shankar
    Decision Problems for Propositional Linear Logic [Citation Graph (0, 0)][DBLP]
    FOCS, 1990, pp:662-671 [Conf]
  46. John C. Mitchell
    Semantic Models for Second-Order Lambda Calculus [Citation Graph (0, 0)][DBLP]
    FOCS, 1984, pp:289-299 [Conf]
  47. John C. Mitchell, Mark Mitchell, Andre Scedrov
    A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time. [Citation Graph (0, 0)][DBLP]
    FOCS, 1998, pp:725-733 [Conf]
  48. Ajith Ramanathan, John C. Mitchell, Andre Scedrov, Vanessa Teague
    Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2004, pp:468-483 [Conf]
  49. Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani
    Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:16-29 [Conf]
  50. John C. Mitchell, Ramesh Viswanathan
    Effective Models of Polymorphism, Subtyping and Recursion (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICALP, 1996, pp:170-181 [Conf]
  51. Dinesh Katiyar, David C. Luckham, John C. Mitchell
    Polymorphism and Subtyping in Interfaces. [Citation Graph (0, 0)][DBLP]
    Workshop on Interface Definition Languages, 1994, pp:22-34 [Conf]
  52. Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov
    A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:356-383 [Conf]
  53. John C. Mitchell, Vanessa Teague
    Autonomous Nodes and Distributed Mechanisms. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:58-83 [Conf]
  54. Ajay Chander, Drew Dean, John C. Mitchell
    A Distributed High Assurance Reference Monitor. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:231-244 [Conf]
  55. Brian T. Howard, John C. Mitchell
    Operational and Axiomatic Semantics of PCF. [Citation Graph (0, 0)][DBLP]
    LISP and Functional Programming, 1990, pp:298-306 [Conf]
  56. John C. Mitchell
    A Type-Inference Approach to Reduction Properties and Semantics of Polymorphic Expressions (Summary). [Citation Graph (0, 0)][DBLP]
    LISP and Functional Programming, 1986, pp:308-319 [Conf]
  57. Adam Barth, John C. Mitchell
    Managing Digital Rights using Linear Logic. [Citation Graph (0, 0)][DBLP]
    LICS, 2006, pp:127-136 [Conf]
  58. Patrick Lincoln, John C. Mitchell
    Operational aspects of linear lambda calculus [Citation Graph (0, 0)][DBLP]
    LICS, 1992, pp:235-246 [Conf]
  59. John C. Mitchell, Eugenio Moggi
    Kripke-Style models for typed lambda calculus [Citation Graph (0, 0)][DBLP]
    LICS, 1987, pp:303-314 [Conf]
  60. John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague
    Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    LICS, 2001, pp:3-8 [Conf]
  61. John C. Mitchell, Albert R. Meyer
    Second-Order Logical Relations (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Logic of Programs, 1985, pp:225-236 [Conf]
  62. Luca Cardelli, John C. Mitchell
    Operations on Records. [Citation Graph (0, 0)][DBLP]
    Mathematical Foundations of Programming Semantics, 1989, pp:22-52 [Conf]
  63. Changhua He, John C. Mitchell
    Security Analysis and Improvements for IEEE 802.11i. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  64. Neil Chou, Robert Ledesma, Yuka Teraguchi, John C. Mitchell
    Client-Side Defense Against Web-Based Identity Theft. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  65. Vitaly Shmatikov, John C. Mitchell
    Analysis of a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  66. Stephen N. Freund, John C. Mitchell
    A Type System for Object Initialization in the Java Bytecode Language. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1998, pp:310-327 [Conf]
  67. Stephen N. Freund, John C. Mitchell
    A Formal Framework for the Java Bytecode Language and Verifier. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1999, pp:147-166 [Conf]
  68. Ninghui Li, John C. Mitchell
    DATALOG with Constraints: A Foundation for Trust Management Languages. [Citation Graph (0, 0)][DBLP]
    PADL, 2003, pp:58-73 [Conf]
  69. Kim B. Bruce, John C. Mitchell
    PER Models of Subtyping, Recursive Types and Higher-Order Polymorphism. [Citation Graph (0, 0)][DBLP]
    POPL, 1992, pp:316-327 [Conf]
  70. Robert Harper, John C. Mitchell, Eugenio Moggi
    Higher-Order Modules and the Phase Distinction. [Citation Graph (0, 0)][DBLP]
    POPL, 1990, pp:341-354 [Conf]
  71. My Hoang, John C. Mitchell
    Lower Bounds on Type Inference with Subtypes. [Citation Graph (0, 0)][DBLP]
    POPL, 1995, pp:176-185 [Conf]
  72. Dinesh Katiyar, David C. Luckham, John C. Mitchell
    A Type System for Prototyping Languages. [Citation Graph (0, 0)][DBLP]
    POPL, 1994, pp:138-150 [Conf]
  73. Patrick Lincoln, John C. Mitchell
    Algorithmic Aspects of Type Inference with Subtypes. [Citation Graph (0, 0)][DBLP]
    POPL, 1992, pp:293-304 [Conf]
  74. Albert R. Meyer, John C. Mitchell
    Axiomatic Definability and Completeness for Recursive Programs. [Citation Graph (0, 0)][DBLP]
    POPL, 1982, pp:337-346 [Conf]
  75. Albert R. Meyer, John C. Mitchell, Eugenio Moggi, Richard Statman
    Empty Types in Polymorphic Lambda Calculus. [Citation Graph (0, 0)][DBLP]
    POPL, 1987, pp:253-262 [Conf]
  76. John C. Mitchell
    Programming language methods in computer security. [Citation Graph (0, 0)][DBLP]
    POPL, 2001, pp:1-3 [Conf]
  77. John C. Mitchell, Sigurd Meldal, Neel Madhav
    An Extension of Standard ML Modules with Subtyping and Inheritance. [Citation Graph (0, 0)][DBLP]
    POPL, 1991, pp:270-278 [Conf]
  78. John C. Mitchell
    Security analysis of network protocols: logical and computational methods. [Citation Graph (0, 0)][DBLP]
    PPDP, 2005, pp:151-152 [Conf]
  79. John C. Mitchell
    Multiset Rewriting and Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    RTA, 2002, pp:19-22 [Conf]
  80. Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum
    Privacy and Contextual Integrity: Framework and Applications. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:184-198 [Conf]
  81. David Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz
    Specifying and Verifying Hardware for Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:166-0 [Conf]
  82. Ninghui Li, William H. Winsborough, John C. Mitchell
    Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:123-139 [Conf]
  83. John C. Mitchell, Mark Mitchell, Ulrich Stern
    Automated analysis of cryptographic protocols using Mur-phi. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:141-151 [Conf]
  84. Ninghui Li, John C. Mitchell, William H. Winsborough
    Design of a Role-Based Trust-Management Framework. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:114-130 [Conf]
  85. John C. Mitchell
    On Abstraction and the Expressive Power of Programming Languages. [Citation Graph (0, 0)][DBLP]
    TACS, 1991, pp:290-310 [Conf]
  86. Kathleen Fisher, John C. Mitchell
    Notes on Typed Object-Oriented Programming. [Citation Graph (0, 0)][DBLP]
    TACS, 1994, pp:844-885 [Conf]
  87. John C. Mitchell, Michael J. O'Donnell
    Realisability Semantics for Error-Tolerant Logics. [Citation Graph (0, 0)][DBLP]
    TARK, 1986, pp:363-382 [Conf]
  88. Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
    Games and the Impossibility of Realizable Ideal Functionality. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:360-379 [Conf]
  89. Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan
    On the Relationships Between Notions of Simulation-Based Security. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:476-494 [Conf]
  90. Adam Barth, John C. Mitchell, Justin Rosenstein
    Conflict and combination in privacy policy languages. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:45-46 [Conf]
  91. Changhua He, John C. Mitchell
    Analysis of the 802.11i 4-way handshake. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:43-50 [Conf]
  92. Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell
    Protecting browser state from web privacy attacks. [Citation Graph (0, 0)][DBLP]
    WWW, 2006, pp:737-744 [Conf]
  93. Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell
    Protecting browser state from web privacy attacks. [Citation Graph (0, 0)][DBLP]
    WWW, 2006, pp:737-744 [Conf]
  94. Patrick Lincoln, John C. Mitchell, Andre Scedrov, Natarajan Shankar
    Decision Problems for Propositional Linear Logic. [Citation Graph (0, 0)][DBLP]
    Ann. Pure Appl. Logic, 1992, v:56, n:1-3, pp:239-311 [Journal]
  95. John C. Mitchell, Eugenio Moggi
    Kripke-Style Models for Typed lambda Calculus. [Citation Graph (0, 0)][DBLP]
    Ann. Pure Appl. Logic, 1991, v:51, n:1-2, pp:99-124 [Journal]
  96. Patrick Lincoln, John C. Mitchell, Andre Scedrov
    Linear logic proof games and optimization. [Citation Graph (0, 0)][DBLP]
    Bulletin of Symbolic Logic, 1996, v:2, n:3, pp:322-338 [Journal]
  97. Carl A. Gunter, John C. Mitchell, David Notkin
    Strategic Directions in Software Engineering and Programming Languages. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:4, pp:727-737 [Journal]
  98. Robert Harper, John C. Mitchell
    ML and Beyond. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:4es, pp:219- [Journal]
  99. Viviana Bono, John C. Mitchell, Amit Patel, Vitaly Shmatikov
    A Core Calculus of Classes and Objects. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1999, v:20, n:, pp:- [Journal]
  100. Stephen N. Freund, John C. Mitchell
    A Type System For Object Initialization In the Java Bytecode Language. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1997, v:10, n:, pp:- [Journal]
  101. Patrick Lincoln, John C. Mitchell, Andre Scedrov
    The Complexity of Local Proof Search in Linear Logic. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1996, v:3, n:, pp:- [Journal]
  102. John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague
    A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report). [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:45, n:, pp:- [Journal]
  103. Anupam Datta, Ante Derek, John C. Mitchell, Arnab Roy
    Protocol Composition Logic (PCL). [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:172, n:, pp:311-358 [Journal]
  104. Lalita Jategaonkar, John C. Mitchell
    Type Inference with Extended Pattern Matching and Subtypes. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 1993, v:19, n:1/2, pp:127-165 [Journal]
  105. Luca Cardelli, Simone Martini, John C. Mitchell, Andre Scedrov
    An Extension of System F with Subtyping [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1994, v:109, n:1/2, pp:4-56 [Journal]
  106. Kim B. Bruce, Albert R. Meyer, John C. Mitchell
    The Semantics of Second-Order Lambda Calculus [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1990, v:85, n:1, pp:76-134 [Journal]
  107. Albert R. Meyer, John C. Mitchell
    Termination Assertions for Recursive Programs: Completeness and Axiomatic Definability [Citation Graph (0, 0)][DBLP]
    Information and Control, 1983, v:56, n:1/2, pp:112-138 [Journal]
  108. John C. Mitchell
    Polymorphic Type Inference and Containment [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1988, v:76, n:2/3, pp:211-249 [Journal]
  109. John C. Mitchell, Ramesh Viswanathan
    Standard ML-NJ Weak Polymorphism and Imperative Constructs. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1996, v:127, n:2, pp:102-116 [Journal]
  110. Ninghui Li, John C. Mitchell
    Understanding SPKI/SDSI using first-order logic. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:1, pp:48-64 [Journal]
  111. Robert Harper, John C. Mitchell
    Parametricity and Variants of Girard's J Operator. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:70, n:1, pp:1-5 [Journal]
  112. Ninghui Li, John C. Mitchell, William H. Winsborough
    Beyond proof-of-compliance: security analysis in trust management. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2005, v:52, n:3, pp:474-514 [Journal]
  113. Stephen N. Freund, John C. Mitchell
    A Type System for the Java Bytecode Language and Verifier. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2003, v:30, n:3-4, pp:271-321 [Journal]
  114. Nancy A. Durgin, Patrick Lincoln, John C. Mitchell
    Multiset rewriting and the complexity of bounded security protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:2, pp:247-311 [Journal]
  115. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    A derivation system and compositional logic for security protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:3, pp:423-482 [Journal]
  116. Ninghui Li, William H. Winsborough, John C. Mitchell
    Distributed Credential Chain Discovery in Trust Management. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:1, pp:35-86 [Journal]
  117. Ajay Chander, Drew Dean, John C. Mitchell
    Reconstructing Trust Management. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:1, pp:131-164 [Journal]
  118. Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic
    A Compositional Logic for Proving Security Properties of Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:4, pp:677-722 [Journal]
  119. John C. Mitchell
    Type Inference With Simple Subtypes. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 1991, v:1, n:3, pp:245-285 [Journal]
  120. Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov
    Contract signing, optimism, and advantage. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2005, v:64, n:2, pp:189-218 [Journal]
  121. Luca Cardelli, John C. Mitchell
    Operations on Records. [Citation Graph (0, 0)][DBLP]
    Mathematical Structures in Computer Science, 1991, v:1, n:1, pp:3-48 [Journal]
  122. Kathleen Fisher, Furio Honsell, John C. Mitchell
    A lambda Calculus of Objects and Method Specialization. [Citation Graph (0, 0)][DBLP]
    Nord. J. Comput., 1994, v:1, n:1, pp:3-37 [Journal]
  123. John C. Mitchell
    On Abstraction and the Expressive Power of Programming Languages. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1993, v:21, n:2, pp:141-163 [Journal]
  124. Robert Harper, John C. Mitchell
    ML and Beyond. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 1997, v:32, n:1, pp:80-85 [Journal]
  125. Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell
    Security by typing. [Citation Graph (0, 0)][DBLP]
    STTT, 2003, v:4, n:4, pp:472-495 [Journal]
  126. Kathleen Fisher, John C. Mitchell
    The Development of Type Systems for Object-Oriented Languages. [Citation Graph (0, 0)][DBLP]
    TAPOS, 1995, v:1, n:3, pp:189-220 [Journal]
  127. Kathleen Fisher, John C. Mitchell
    On the Relationship Between Classes, Objects, and Data Abstraction. [Citation Graph (0, 0)][DBLP]
    TAPOS, 1998, v:4, n:1, pp:3-25 [Journal]
  128. Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
    Compositional analysis of contract-signing protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:33-56 [Journal]
  129. Patrick Lincoln, John C. Mitchell, Andre Scedrov
    Optimization Complexity of Linear Logic Proof Games. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:227, n:1-2, pp:299-331 [Journal]
  130. John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague
    A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:353, n:1-3, pp:118-164 [Journal]
  131. Vitaly Shmatikov, John C. Mitchell
    Finite-state analysis of two contract signing protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:283, n:2, pp:419-450 [Journal]
  132. Stephen N. Freund, John C. Mitchell
    The type system for object initializatiion in the Jave bytecode language. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1999, v:21, n:6, pp:1196-1250 [Journal]
  133. Robert Harper, John C. Mitchell
    On the Type Structure of Standard ML. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1993, v:15, n:2, pp:211-252 [Journal]
  134. Elizabeth Stinson, John C. Mitchell
    Characterizing Bots' Remote Control Behavior. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:89-108 [Conf]
  135. Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
    Inductive Proofs of Computational Secrecy. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:219-234 [Conf]

  136. Analysis of EAP-GPSK Authentication Protocol. [Citation Graph (, )][DBLP]


  137. An Operational Semantics for JavaScript. [Citation Graph (, )][DBLP]


  138. Secrecy Analysis in Protocol Composition Logic. [Citation Graph (, )][DBLP]


  139. Robust defenses for cross-site request forgery. [Citation Graph (, )][DBLP]


  140. Privacy and Utility in Business Processes. [Citation Graph (, )][DBLP]


  141. Towards a Formal Foundation of Web Security. [Citation Graph (, )][DBLP]


  142. Isolating JavaScript with Filters, Rewriting, and Wrappers. [Citation Graph (, )][DBLP]


  143. A Learning-Based Approach to Reactive Security. [Citation Graph (, )][DBLP]


  144. Enterprise privacy promises and enforcement. [Citation Graph (, )][DBLP]


  145. A Layered Architecture for Detecting Malicious Behaviors. [Citation Graph (, )][DBLP]


  146. Practical declarative network management. [Citation Graph (, )][DBLP]


  147. How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation. [Citation Graph (, )][DBLP]


  148. Object Capabilities and Isolation of Untrusted Web Applications. [Citation Graph (, )][DBLP]


  149. State of the Art: Automated Black-Box Web Application Vulnerability Testing. [Citation Graph (, )][DBLP]


  150. Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. [Citation Graph (, )][DBLP]


  151. A Formalization of HIPAA for a Medical Messaging System. [Citation Graph (, )][DBLP]


  152. Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods. [Citation Graph (, )][DBLP]


  153. Securing Frame Communication in Browsers. [Citation Graph (, )][DBLP]


  154. Securing frame communication in browsers. [Citation Graph (, )][DBLP]


  155. A Learning-Based Approach to Reactive Security [Citation Graph (, )][DBLP]


  156. An Automated Approach for Proving PCL Invariants. [Citation Graph (, )][DBLP]


Search in 0.040secs, Finished in 0.051secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002