|
Search the dblp DataBase
Mark Mitchell:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz
Architectural Support for Copy and Tamper Resistant Software. [Citation Graph (0, 0)][DBLP] ASPLOS, 2000, pp:168-177 [Conf]
- Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov
A Probabilistic Poly-Time Framework for Protocol Analysis. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1998, pp:112-121 [Conf]
- Kristina Toutanova, Mark Mitchell, Christopher D. Manning
Optimizing Local Probability Models for Statistical Parsing. [Citation Graph (0, 0)][DBLP] ECML, 2003, pp:409-420 [Conf]
- Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov
Probabilistic Polynomial-Time Equivalence and Security Analysis. [Citation Graph (0, 0)][DBLP] World Congress on Formal Methods, 1999, pp:776-793 [Conf]
- John C. Mitchell, Mark Mitchell, Andre Scedrov
A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time. [Citation Graph (0, 0)][DBLP] FOCS, 1998, pp:725-733 [Conf]
- John C. Mitchell, Mark Mitchell, Ulrich Stern
Automated analysis of cryptographic protocols using Mur-phi. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:141-151 [Conf]
Search in 0.003secs, Finished in 0.003secs
|