BibTeX records: John C. Mitchell

download as .bib file

@article{DBLP:journals/internet/KizilcecM24,
  author       = {Ren{\'{e}} F. Kizilcec and
                  John C. Mitchell},
  title        = {Remote Learning and Work},
  journal      = {{IEEE} Internet Comput.},
  volume       = {28},
  number       = {1},
  pages        = {7--9},
  year         = {2024},
  url          = {https://doi.org/10.1109/MIC.2023.3339941},
  doi          = {10.1109/MIC.2023.3339941},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/KizilcecM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/WangMP24,
  author       = {Sierra Wang and
                  John C. Mitchell and
                  Chris Piech},
  editor       = {Ben Stephenson and
                  Jeffrey A. Stone and
                  Lina Battestilli and
                  Samuel A. Rebelsky and
                  Libby Shoop},
  title        = {A Large Scale {RCT} on Effective Error Messages in {CS1}},
  booktitle    = {Proceedings of the 55th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2024, Volume 1, Portland, OR, USA, March 20-23,
                  2024},
  pages        = {1395--1401},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3626252.3630764},
  doi          = {10.1145/3626252.3630764},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/WangMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/WangMHP24,
  author       = {Sierra Wang and
                  John C. Mitchell and
                  Nick Haber and
                  Chris Piech},
  editor       = {Ben Stephenson and
                  Jeffrey A. Stone and
                  Lina Battestilli and
                  Samuel A. Rebelsky and
                  Libby Shoop},
  title        = {Math {IDE:} {A} Platform for Creating with Math},
  booktitle    = {Proceedings of the 55th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2024, Volume 2, Portland, OR, USA, March 20-23,
                  2024},
  pages        = {1844--1845},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3626253.3635572},
  doi          = {10.1145/3626253.3635572},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/WangMHP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-04489,
  author       = {Sanjari Srivastava and
                  Piotr Mardziel and
                  Zhikhun Zhang and
                  Archana Ahlawat and
                  Anupam Datta and
                  John C. Mitchell},
  title        = {De-amplifying Bias from Differential Privacy in Language Model Fine-tuning},
  journal      = {CoRR},
  volume       = {abs/2402.04489},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.04489},
  doi          = {10.48550/ARXIV.2402.04489},
  eprinttype    = {arXiv},
  eprint       = {2402.04489},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-04489.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23,
  author       = {Clark W. Barrett and
                  Brad Boyd and
                  Elie Bursztein and
                  Nicholas Carlini and
                  Brad Chen and
                  Jihye Choi and
                  Amrita Roy Chowdhury and
                  Mihai Christodorescu and
                  Anupam Datta and
                  Soheil Feizi and
                  Kathleen Fisher and
                  Tatsunori Hashimoto and
                  Dan Hendrycks and
                  Somesh Jha and
                  Daniel Kang and
                  Florian Kerschbaum and
                  Eric Mitchell and
                  John C. Mitchell and
                  Zulfikar Ramzan and
                  Khawaja Shams and
                  Dawn Song and
                  Ankur Taly and
                  Diyi Yang},
  title        = {Identifying and Mitigating the Security Risks of Generative {AI}},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--52},
  year         = {2023},
  url          = {https://doi.org/10.1561/3300000041},
  doi          = {10.1561/3300000041},
  timestamp    = {Sun, 24 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/CharitsisPM23,
  author       = {Charis Charitsis and
                  Chris Piech and
                  John C. Mitchell},
  editor       = {Maureen Doyle and
                  Ben Stephenson and
                  Brian Dorn and
                  Leen{-}Kiat Soh and
                  Lina Battestilli},
  title        = {Detecting the Reasons for Program Decomposition in {CS1} and Evaluating
                  Their Impact},
  booktitle    = {Proceedings of the 54th {ACM} Technical Symposium on Computer Science
                  Education, Volume 1, {SIGCSE} 2023, Toronto, ON, Canada, March 15-18,
                  2023},
  pages        = {1014--1020},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3545945.3569763},
  doi          = {10.1145/3545945.3569763},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/CharitsisPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-14840,
  author       = {Clark W. Barrett and
                  Brad Boyd and
                  Ellie Burzstein and
                  Nicholas Carlini and
                  Brad Chen and
                  Jihye Choi and
                  Amrita Roy Chowdhury and
                  Mihai Christodorescu and
                  Anupam Datta and
                  Soheil Feizi and
                  Kathleen Fisher and
                  Tatsunori Hashimoto and
                  Dan Hendrycks and
                  Somesh Jha and
                  Daniel Kang and
                  Florian Kerschbaum and
                  Eric Mitchell and
                  John C. Mitchell and
                  Zulfikar Ramzan and
                  Khawaja Shams and
                  Dawn Song and
                  Ankur Taly and
                  Diyi Yang},
  title        = {Identifying and Mitigating the Security Risks of Generative {AI}},
  journal      = {CoRR},
  volume       = {abs/2308.14840},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.14840},
  doi          = {10.48550/ARXIV.2308.14840},
  eprinttype    = {arXiv},
  eprint       = {2308.14840},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-14840.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-05174,
  author       = {Nicholas Mosier and
                  Hamed Nemati and
                  John C. Mitchell and
                  Caroline Trippel},
  title        = {Serberus: Protecting Cryptographic Code from Spectres at Compile-Time},
  journal      = {CoRR},
  volume       = {abs/2309.05174},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.05174},
  doi          = {10.48550/ARXIV.2309.05174},
  eprinttype    = {arXiv},
  eprint       = {2309.05174},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-05174.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lats/CharitsisPM22,
  author       = {Charis Charitsis and
                  Chris Piech and
                  John C. Mitchell},
  editor       = {Ren{\'{e}} F. Kizilcec and
                  Katie Davis and
                  Xavier Ochoa},
  title        = {Function Names: Quantifying the Relationship Between Identifiers and
                  Their Functionality to Improve Them},
  booktitle    = {L@S'22: Ninth {ACM} Conference on Learning @ Scale, New York City,
                  NY, USA, June 1 - 3, 2022},
  pages        = {93--101},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491140.3528269},
  doi          = {10.1145/3491140.3528269},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lats/CharitsisPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lats/CharitsisPM22a,
  author       = {Charis Charitsis and
                  Chris Piech and
                  John C. Mitchell},
  editor       = {Ren{\'{e}} F. Kizilcec and
                  Katie Davis and
                  Xavier Ochoa},
  title        = {Using {NLP} to Quantify Program Decomposition in {CS1}},
  booktitle    = {L@S'22: Ninth {ACM} Conference on Learning @ Scale, New York City,
                  NY, USA, June 1 - 3, 2022},
  pages        = {113--120},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491140.3528272},
  doi          = {10.1145/3491140.3528272},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lats/CharitsisPM22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/CharitsisPM21,
  author       = {Charis Charitsis and
                  Chris Piech and
                  John C. Mitchell},
  editor       = {Larry Merkle and
                  Maureen Doyle and
                  Judithe Sheard and
                  Leen{-}Kiat Soh and
                  Brian Dorn},
  title        = {Feedback on Program Development Process for {CS1} Students},
  booktitle    = {{SIGCSE} 2022: The 53rd {ACM} Technical Symposium on Computer Science
                  Education, Providence, RI, USA, March 3-5, 2022, Volume 2},
  pages        = {1150},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3478432.3499062},
  doi          = {10.1145/3478432.3499062},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/CharitsisPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-09050,
  author       = {Maxwell Bigman and
                  Yosefa Gilon and
                  Jenny Han and
                  John C. Mitchell},
  title        = {Insights for post-pandemic pedagogy across one {CS} department},
  journal      = {CoRR},
  volume       = {abs/2203.09050},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.09050},
  doi          = {10.48550/ARXIV.2203.09050},
  eprinttype    = {arXiv},
  eprint       = {2203.09050},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-09050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-05181,
  author       = {Sam Blackshear and
                  John C. Mitchell and
                  Todd Nowacki and
                  Shaz Qadeer},
  title        = {The Move Borrow Checker},
  journal      = {CoRR},
  volume       = {abs/2205.05181},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.05181},
  doi          = {10.48550/ARXIV.2205.05181},
  eprinttype    = {arXiv},
  eprint       = {2205.05181},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-05181.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icetm/CharitsisPM21,
  author       = {Charis Charitsis and
                  Chris Piech and
                  John C. Mitchell},
  title        = {Simplifying Automated Assessment in {CS1}},
  booktitle    = {{ICETM} 2021: 4th International Conference on Education Technology
                  Management, Tokyo, Japan, December 17 - 19, 2021},
  pages        = {226--231},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3510309.3510345},
  doi          = {10.1145/3510309.3510345},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icetm/CharitsisPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lats/CharitsisPM21,
  author       = {Charis Charitsis and
                  Chris Piech and
                  John C. Mitchell},
  editor       = {Christoph Meinel and
                  Mar P{\'{e}}rez{-}Sanagust{\'{\i}}n and
                  Marcus Specht and
                  Amy Ogan},
  title        = {Assessing Function Names and Quantifying the Relationship Between
                  Identifiers and Their Functionality to Improve Them},
  booktitle    = {L@S'21: Eighth {ACM} Conference on Learning @ Scale, Virtual Event,
                  Germany, June 22-25, 2021},
  pages        = {291--294},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3430895.3460161},
  doi          = {10.1145/3430895.3460161},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lats/CharitsisPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/DiGiacomo-Castillo20,
  author       = {Max DiGiacomo{-}Castillo and
                  Yiyun Liang and
                  Advay Pal and
                  John C. Mitchell},
  title        = {Model Checking Bitcoin and other Proof-of-Work Consensus Protocols},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes,
                  Greece, November 2-6, 2020},
  pages        = {351--358},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/Blockchain50366.2020.00051},
  doi          = {10.1109/BLOCKCHAIN50366.2020.00051},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/DiGiacomo-Castillo20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/BassenBSTPZGFM20,
  author       = {Jonathan Bassen and
                  Bharathan Balaji and
                  Michael Schaarschmidt and
                  Candace Thille and
                  Jay Painter and
                  Dawn Zimmaro and
                  Alex Games and
                  Ethan Fast and
                  John C. Mitchell},
  editor       = {Regina Bernhaupt and
                  Florian 'Floyd' Mueller and
                  David Verweij and
                  Josh Andres and
                  Joanna McGrenere and
                  Andy Cockburn and
                  Ignacio Avellino and
                  Alix Goguey and
                  Pernille Bj{\o}n and
                  Shengdong Zhao and
                  Briane Paul Samson and
                  Rafal Kocielnik},
  title        = {Reinforcement Learning for the Adaptive Scheduling of Educational
                  Activities},
  booktitle    = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems,
                  Honolulu, HI, USA, April 25-30, 2020},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3313831.3376518},
  doi          = {10.1145/3313831.3376518},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/BassenBSTPZGFM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lwmoocs/BigmanM20,
  author       = {Maxwell Bigman and
                  John C. Mitchell},
  title        = {Teaching Online in 2020: Experiments, Empathy, Discovery},
  booktitle    = {{IEEE} Learning With MOOCS, {LWMOOCS} 2020, Antigua Guatemala, Guatemala,
                  September 29 - October 2, 2020},
  pages        = {156--161},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/LWMOOCS50143.2020.9234318},
  doi          = {10.1109/LWMOOCS50143.2020.9234318},
  timestamp    = {Fri, 24 Sep 2021 09:47:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lwmoocs/BigmanM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-05106,
  author       = {Sam Blackshear and
                  David L. Dill and
                  Shaz Qadeer and
                  Clark W. Barrett and
                  John C. Mitchell and
                  Oded Padon and
                  Yoni Zohar},
  title        = {Resources: {A} Safe Language Abstraction for Money},
  journal      = {CoRR},
  volume       = {abs/2004.05106},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.05106},
  eprinttype    = {arXiv},
  eprint       = {2004.05106},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-05106.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-08644,
  author       = {Max DiGiacomo{-}Castillo and
                  Yiyun Liang and
                  Advay Pal and
                  John C. Mitchell},
  title        = {Model Checking Bitcoin and other Proof-of-Work Consensus Protocols},
  journal      = {CoRR},
  volume       = {abs/2007.08644},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.08644},
  eprinttype    = {arXiv},
  eprint       = {2007.08644},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-08644.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BartheFFMSS19,
  author       = {Gilles Barthe and
                  Edvard Fagerholm and
                  Dario Fiore and
                  John C. Mitchell and
                  Andre Scedrov and
                  Benedikt Schmidt},
  title        = {Automated Analysis of Cryptographic Assumptions in Generic Group Models},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {324--360},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9302-3},
  doi          = {10.1007/S00145-018-9302-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BartheFFMSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MandalMM018,
  author       = {Avradip Mandal and
                  John C. Mitchell and
                  Hart Montgomery and
                  Arnab Roy},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Giovanni Livraga and
                  Ruben Rios},
  title        = {Data Oblivious Genome Variants Search on Intel {SGX}},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2018 International Workshops, {DPM} 2018 and {CBT} 2018,
                  Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11025},
  pages        = {296--310},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00305-0\_21},
  doi          = {10.1007/978-3-030-00305-0\_21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MandalMM018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lats/BassenHFMT18,
  author       = {Jonathan Bassen and
                  Iris Howley and
                  Ethan Fast and
                  John C. Mitchell and
                  Candace Thille},
  editor       = {Rose Luckin and
                  Scott R. Klemmer and
                  Kenneth R. Koedinger},
  title        = {{OARS:} exploring instructor analytics for online learning},
  booktitle    = {Proceedings of the Fifth Annual {ACM} Conference on Learning at Scale,
                  London, UK, June 26-28, 2018},
  pages        = {55:1--55:10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3231644.3231669},
  doi          = {10.1145/3231644.3231669},
  timestamp    = {Sat, 11 Sep 2021 23:19:16 +0200},
  biburl       = {https://dblp.org/rec/conf/lats/BassenHFMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TheodorakisM18,
  author       = {Eftychios Theodorakis and
                  John C. Mitchell},
  title        = {Semantic Security Invariance under Variant Computational Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TheodorakisM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MandalMMR18,
  author       = {Avradip Mandal and
                  John C. Mitchell and
                  Hart Montgomery and
                  Arnab Roy},
  title        = {Data Oblivious Genome Variants Search on Intel {SGX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {732},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/732},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MandalMMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GiffinLSTMMR17,
  author       = {Daniel B. Giffin and
                  Amit Levy and
                  Deian Stefan and
                  David Terei and
                  David Mazi{\`{e}}res and
                  John C. Mitchell and
                  Alejandro Russo},
  title        = {Hails: Protecting data privacy in untrusted web applications},
  journal      = {J. Comput. Secur.},
  volume       = {25},
  number       = {4-5},
  pages        = {427--461},
  year         = {2017},
  url          = {https://doi.org/10.3233/JCS-15801},
  doi          = {10.3233/JCS-15801},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GiffinLSTMMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/StefanMMR17,
  author       = {Deian Stefan and
                  David Mazi{\`{e}}res and
                  John C. Mitchell and
                  Alejandro Russo},
  title        = {Flexible dynamic information flow control in the presence of exceptions},
  journal      = {J. Funct. Program.},
  volume       = {27},
  pages        = {e5},
  year         = {2017},
  url          = {https://doi.org/10.1017/S0956796816000241},
  doi          = {10.1017/S0956796816000241},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/StefanMMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MandalMM017,
  author       = {Avradip Mandal and
                  John C. Mitchell and
                  Hart William Montgomery and
                  Arnab Roy},
  title        = {Privacy for targeted advertising},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {438--443},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228673},
  doi          = {10.1109/CNS.2017.8228673},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MandalMM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MandalMMR17,
  author       = {Avradip Mandal and
                  John C. Mitchell and
                  Hart William Montgomery and
                  Arnab Roy},
  title        = {Privacy for Targeted Advertising},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/658},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MandalMMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pnas/MayerMM16,
  author       = {Jonathan R. Mayer and
                  Patrick Mutchler and
                  John C. Mitchell},
  title        = {Evaluating the privacy properties of telephone metadata},
  journal      = {Proc. Natl. Acad. Sci. {USA}},
  volume       = {113},
  number       = {20},
  pages        = {5536--5541},
  year         = {2016},
  url          = {https://doi.org/10.1073/pnas.1508081113},
  doi          = {10.1073/PNAS.1508081113},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pnas/MayerMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WuZPM16,
  author       = {David J. Wu and
                  Joe Zimmerman and
                  J{\'{e}}r{\'{e}}my Planul and
                  John C. Mitchell},
  title        = {Privacy-Preserving Shortest Path Computation},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/privacy-preserving-shortest-path-computation.pdf},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/WuZPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MutchlerSDM16,
  author       = {Patrick Mutchler and
                  Yeganeh Safaei and
                  Adam Doup{\'{e}} and
                  John C. Mitchell},
  title        = {Target Fragmentation in Android Apps},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {204--213},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.31},
  doi          = {10.1109/SPW.2016.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MutchlerSDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/PaskovMH15,
  author       = {Hristo S. Paskov and
                  John C. Mitchell and
                  Trevor J. Hastie},
  editor       = {Yoshua Bengio and
                  Yann LeCun},
  title        = {Data Representation and Compression Using Linear-Programming Approximations},
  booktitle    = {4th International Conference on Learning Representations, {ICLR} 2016,
                  San Juan, Puerto Rico, May 2-4, 2016, Conference Track Proceedings},
  year         = {2016},
  url          = {http://arxiv.org/abs/1511.06606},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PaskovMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuZPM16,
  author       = {David J. Wu and
                  Joe Zimmerman and
                  J{\'{e}}r{\'{e}}my Planul and
                  John C. Mitchell},
  title        = {Privacy-Preserving Shortest Path Computation},
  journal      = {CoRR},
  volume       = {abs/1601.02281},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.02281},
  eprinttype    = {arXiv},
  eprint       = {1601.02281},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuZPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/HeuleSYMR15,
  author       = {Stefan Heule and
                  Deian Stefan and
                  Edward Z. Yang and
                  John C. Mitchell and
                  Alejandro Russo},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {{IFC} Inside: Retrofitting Languages with Dynamic Information Flow
                  Control},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {11--31},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_2},
  doi          = {10.1007/978-3-662-46666-7\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/HeuleSYMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uai/PaskovMH15,
  author       = {Hristo S. Paskov and
                  John C. Mitchell and
                  Trevor J. Hastie},
  editor       = {Marina Meila and
                  Tom Heskes},
  title        = {Fast Algorithms for Learning with Long N-grams via Suffix Tree Based
                  Matrix Multiplication},
  booktitle    = {Proceedings of the Thirty-First Conference on Uncertainty in Artificial
                  Intelligence, {UAI} 2015, July 12-16, 2015, Amsterdam, The Netherlands},
  pages        = {672--681},
  publisher    = {{AUAI} Press},
  year         = {2015},
  url          = {http://auai.org/uai2015/proceedings/papers/285.pdf},
  timestamp    = {Thu, 12 Mar 2020 11:31:09 +0100},
  biburl       = {https://dblp.org/rec/conf/uai/PaskovMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HeuleSYMR15,
  author       = {Stefan Heule and
                  Deian Stefan and
                  Edward Z. Yang and
                  John C. Mitchell and
                  Alejandro Russo},
  title        = {{IFC} Inside: Retrofitting Languages with Dynamic Information Flow
                  Control (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/1501.04132},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.04132},
  eprinttype    = {arXiv},
  eprint       = {1501.04132},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HeuleSYMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DattaHM0S15,
  author       = {Anupam Datta and
                  Joseph Y. Halpern and
                  John C. Mitchell and
                  Arnab Roy and
                  Shayak Sen},
  title        = {A Symbolic Logic with Concrete Bounds for Cryptographic Protocols},
  journal      = {CoRR},
  volume       = {abs/1511.07536},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.07536},
  eprinttype    = {arXiv},
  eprint       = {1511.07536},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DattaHM0S15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-manifestos/DillenbourgFKMW14,
  author       = {Pierre Dillenbourg and
                  Armando Fox and
                  Claude Kirchner and
                  John C. Mitchell and
                  Martin Wirsing},
  title        = {Massive Open Online Courses: Current State and Perspectives (Dagstuhl
                  Perspectives Workshop 14112)},
  journal      = {Dagstuhl Manifestos},
  volume       = {4},
  number       = {1},
  pages        = {1--27},
  year         = {2014},
  url          = {https://doi.org/10.4230/DagMan.4.1.1},
  doi          = {10.4230/DAGMAN.4.1.1},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-manifestos/DillenbourgFKMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ubiquity/Mitchell14,
  author       = {John C. Mitchell},
  title        = {MOOCs on and off the Farm: MOOCs and technology to advance learning
                  and learning research (Ubiquity symposium)},
  journal      = {Ubiquity},
  volume       = {2014},
  number       = {June},
  pages        = {1:1--1:10},
  year         = {2014},
  url          = {https://doi.org/10.1145/2591679},
  doi          = {10.1145/2591679},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ubiquity/Mitchell14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aistats/PaskovMH14,
  author       = {Hristo S. Paskov and
                  John C. Mitchell and
                  Trevor J. Hastie},
  title        = {An Efficient Algorithm for Large Scale Compressive Feature Learning},
  booktitle    = {Proceedings of the Seventeenth International Conference on Artificial
                  Intelligence and Statistics, {AISTATS} 2014, Reykjavik, Iceland, April
                  22-25, 2014},
  series       = {{JMLR} Workshop and Conference Proceedings},
  volume       = {33},
  pages        = {760--768},
  publisher    = {JMLR.org},
  year         = {2014},
  url          = {http://proceedings.mlr.press/v33/paskov14.html},
  timestamp    = {Wed, 29 May 2019 08:41:44 +0200},
  biburl       = {https://dblp.org/rec/conf/aistats/PaskovMH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/BurszteinMFBMJ14,
  author       = {Elie Bursztein and
                  Angelique Moscicki and
                  Celine Fabry and
                  Steven Bethard and
                  John C. Mitchell and
                  Dan Jurafsky},
  editor       = {Matt Jones and
                  Philippe A. Palanque and
                  Albrecht Schmidt and
                  Tovi Grossman},
  title        = {Easy does it: more usable CAPTCHAs},
  booktitle    = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto,
                  ON, Canada - April 26 - May 01, 2014},
  pages        = {2637--2646},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556288.2557322},
  doi          = {10.1145/2556288.2557322},
  timestamp    = {Tue, 01 Jun 2021 15:21:43 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/BurszteinMFBMJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartheFFMSS14,
  author       = {Gilles Barthe and
                  Edvard Fagerholm and
                  Dario Fiore and
                  John C. Mitchell and
                  Andre Scedrov and
                  Benedikt Schmidt},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Automated Analysis of Cryptographic Assumptions in Generic Group Models},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {95--112},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_6},
  doi          = {10.1007/978-3-662-44371-2\_6},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BartheFFMSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/MitchellZ14,
  author       = {John C. Mitchell and
                  Joe Zimmerman},
  editor       = {Ernst W. Mayr and
                  Natacha Portier},
  title        = {Data-Oblivious Data Structures},
  booktitle    = {31st International Symposium on Theoretical Aspects of Computer Science
                  {(STACS} 2014), {STACS} 2014, March 5-8, 2014, Lyon, France},
  series       = {LIPIcs},
  volume       = {25},
  pages        = {554--565},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2014},
  url          = {https://doi.org/10.4230/LIPIcs.STACS.2014.554},
  doi          = {10.4230/LIPICS.STACS.2014.554},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/stacs/MitchellZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/BurszteinAMM14,
  author       = {Elie Bursztein and
                  Jonathan Aigrain and
                  Angelika Moscicki and
                  John C. Mitchell},
  editor       = {Sergey Bratus and
                  Felix "FX" Lindner},
  title        = {The End is Nigh: Generic Solving of Text-based CAPTCHAs},
  booktitle    = {8th {USENIX} Workshop on Offensive Technologies, {WOOT} '14, San Diego,
                  CA, USA, August 19, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/woot14/workshop-program/presentation/bursztein},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/BurszteinAMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/DillenbourgKMW14,
  author       = {Pierre Dillenbourg and
                  Claude Kirchner and
                  John C. Mitchell and
                  Martin Wirsing},
  title        = {Massively Open Online Courses, Current State and Perspectives (Dagstuhl
                  Perspectives Workshop 14112)},
  journal      = {Dagstuhl Reports},
  volume       = {4},
  number       = {3},
  pages        = {47--61},
  year         = {2014},
  url          = {https://doi.org/10.4230/DagRep.4.3.47},
  doi          = {10.4230/DAGREP.4.3.47},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/DillenbourgKMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheFFMSS14,
  author       = {Gilles Barthe and
                  Edvard Fagerholm and
                  Dario Fiore and
                  John C. Mitchell and
                  Andre Scedrov and
                  Benedikt Schmidt},
  title        = {Automated Analysis of Cryptographic Assumptions in Generic Group Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/458},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheFFMSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PlanulM13,
  author       = {J{\'{e}}r{\'{e}}my Planul and
                  John C. Mitchell},
  title        = {Oblivious Program Execution and Path-Sensitive Non-interference},
  booktitle    = {2013 {IEEE} 26th Computer Security Foundations Symposium, New Orleans,
                  LA, USA, June 26-28, 2013},
  pages        = {66--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CSF.2013.12},
  doi          = {10.1109/CSF.2013.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/PlanulM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/YangSMMMK13,
  author       = {Edward Z. Yang and
                  Deian Stefan and
                  John C. Mitchell and
                  David Mazi{\`{e}}res and
                  Petr Marchenko and
                  Brad Karp},
  editor       = {Petros Maniatis},
  title        = {Toward Principled Browser Security},
  booktitle    = {14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa
                  Ana Pueblo, New Mexico, USA, May 13-15, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/hotos13/session/yang},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/hotos/YangSMMMK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/Paskov0MH13,
  author       = {Hristo S. Paskov and
                  Robert West and
                  John C. Mitchell and
                  Trevor J. Hastie},
  editor       = {Christopher J. C. Burges and
                  L{\'{e}}on Bottou and
                  Zoubin Ghahramani and
                  Kilian Q. Weinberger},
  title        = {Compressive Feature Learning},
  booktitle    = {Advances in Neural Information Processing Systems 26: 27th Annual
                  Conference on Neural Information Processing Systems 2013. Proceedings
                  of a meeting held December 5-8, 2013, Lake Tahoe, Nevada, United States},
  pages        = {2931--2939},
  year         = {2013},
  url          = {https://proceedings.neurips.cc/paper/2013/hash/5e1b18c4c6a6d31695acbae3fd70ecc6-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/Paskov0MH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChanLM13,
  author       = {Ellick Chan and
                  Peifung E. Lam and
                  John C. Mitchell},
  editor       = {Kevin Fu and
                  Darren Lacey and
                  Zachary N. J. Peterson},
  title        = {Understanding the Challenges with Medical Data Segmentation for Privacy},
  booktitle    = {2013 {USENIX} Workshop on Health Information Technologies, HealthTech
                  '13, Washington, DC, USA, August 12, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/healthtech13/workshop-program/presentation/chan},
  timestamp    = {Mon, 01 Feb 2021 08:43:15 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChanLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2013,
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1},
  doi          = {10.1007/978-3-642-36830-1},
  isbn         = {978-3-642-36829-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/LandwehrBMBLL12,
  author       = {Carl E. Landwehr and
                  Dan Boneh and
                  John C. Mitchell and
                  Steven M. Bellovin and
                  Susan Landau and
                  Michael E. Lesk},
  title        = {Privacy and Cybersecurity: The Next 100 Years},
  journal      = {Proc. {IEEE}},
  volume       = {100},
  number       = {Centennial-Issue},
  pages        = {1659--1673},
  year         = {2012},
  url          = {https://doi.org/10.1109/JPROC.2012.2189794},
  doi          = {10.1109/JPROC.2012.2189794},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/LandwehrBMBLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BarthRSMSB12,
  author       = {Adam Barth and
                  Benjamin I. P. Rubinstein and
                  Mukund Sundararajan and
                  John C. Mitchell and
                  Dawn Song and
                  Peter L. Bartlett},
  title        = {A Learning-Based Approach to Reactive Security},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {482--493},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.42},
  doi          = {10.1109/TDSC.2011.42},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BarthRSMSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Mitchell0SZ12,
  author       = {John C. Mitchell and
                  Rahul Sharma and
                  Deian Stefan and
                  Joe Zimmerman},
  editor       = {Stephen Chong},
  title        = {Information-Flow Control for Programming on Encrypted Data},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {45--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.30},
  doi          = {10.1109/CSF.2012.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Mitchell0SZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfp/StefanRBLMM12,
  author       = {Deian Stefan and
                  Alejandro Russo and
                  Pablo Buiras and
                  Amit Levy and
                  John C. Mitchell and
                  David Mazi{\`{e}}res},
  editor       = {Peter Thiemann and
                  Robby Bruce Findler},
  title        = {Addressing covert termination and timing channels in concurrent information
                  flow systems},
  booktitle    = {{ACM} {SIGPLAN} International Conference on Functional Programming,
                  ICFP'12, Copenhagen, Denmark, September 9-15, 2012},
  pages        = {201--214},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2364527.2364557},
  doi          = {10.1145/2364527.2364557},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfp/StefanRBLMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ihi/LamMSSW12,
  author       = {Peifung E. Lam and
                  John C. Mitchell and
                  Andre Scedrov and
                  Sharada Sundaram and
                  Frank Wang},
  editor       = {Gang Luo and
                  Jiming Liu and
                  Christopher C. Yang},
  title        = {Declarative privacy policy: finite models and attribute-based encryption},
  booktitle    = {{ACM} International Health Informatics Symposium, {IHI} '12, Miami,
                  FL, USA, January 28-30, 2012},
  pages        = {323--332},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2110363.2110401},
  doi          = {10.1145/2110363.2110401},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ihi/LamMSSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/GiffinLSTMMR12,
  author       = {Daniel B. Giffin and
                  Amit Levy and
                  Deian Stefan and
                  David Terei and
                  David Mazi{\`{e}}res and
                  John C. Mitchell and
                  Alejandro Russo},
  editor       = {Chandu Thekkath and
                  Amin Vahdat},
  title        = {Hails: Protecting Data Privacy in Untrusted Web Applications},
  booktitle    = {10th {USENIX} Symposium on Operating Systems Design and Implementation,
                  {OSDI} 2012, Hollywood, CA, USA, October 8-10, 2012},
  pages        = {47--60},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/osdi12/technical-sessions/presentation/giffin},
  timestamp    = {Tue, 02 Feb 2021 08:05:55 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/GiffinLSTMMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MayerM12,
  author       = {Jonathan R. Mayer and
                  John C. Mitchell},
  title        = {Third-Party Web Tracking: Policy and Technology},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {413--427},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.47},
  doi          = {10.1109/SP.2012.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MayerM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/BurszteinSBM12,
  author       = {Elie Bursztein and
                  Chinmay Soman and
                  Dan Boneh and
                  John C. Mitchell},
  editor       = {Alain Mille and
                  Fabien Gandon and
                  Jacques Misselis and
                  Michael Rabinovich and
                  Steffen Staab},
  title        = {SessionJuggler: secure web login from an untrusted terminal using
                  session hijacking},
  booktitle    = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012,
                  Lyon, France, April 16-20, 2012},
  pages        = {321--330},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2187836.2187880},
  doi          = {10.1145/2187836.2187880},
  timestamp    = {Fri, 16 Apr 2021 10:04:12 +0200},
  biburl       = {https://dblp.org/rec/conf/www/BurszteinSBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-1457,
  author       = {Deian Stefan and
                  Alejandro Russo and
                  John C. Mitchell and
                  David Mazi{\`{e}}res},
  title        = {Flexible Dynamic Information Flow Control in the Presence of Exceptions},
  journal      = {CoRR},
  volume       = {abs/1207.1457},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.1457},
  eprinttype    = {arXiv},
  eprint       = {1207.1457},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-1457.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MitchellSSZ12,
  author       = {John C. Mitchell and
                  Rahul Sharma and
                  Deian Stefan and
                  Joe Zimmerman},
  title        = {Information-flow control for programming on encrypted data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MitchellSSZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BauM11,
  author       = {Jason Bau and
                  John C. Mitchell},
  title        = {Security Modeling and Analysis},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {3},
  pages        = {18--25},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.2},
  doi          = {10.1109/MSP.2011.2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BauM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BurszteinMM11,
  author       = {Elie Bursztein and
                  Matthieu Martin and
                  John C. Mitchell},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Text-based {CAPTCHA} strengths and weaknesses},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {125--138},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046724},
  doi          = {10.1145/2046707.2046724},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BurszteinMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BurszteinGM11,
  author       = {Elie Bursztein and
                  Baptiste Gourdin and
                  John C. Mitchell},
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {Reclaiming the Blogosphere, TalkBack: {A} Secure LinkBack Protocol
                  for Weblogs},
  booktitle    = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  pages        = {133--149},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2\_8},
  doi          = {10.1007/978-3-642-23822-2\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BurszteinGM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/BainMSSZ11,
  author       = {Alex Bain and
                  John C. Mitchell and
                  Rahul Sharma and
                  Deian Stefan and
                  Joe Zimmerman},
  editor       = {Supratik Chakraborty and
                  Amit Kumar},
  title        = {A Domain-Specific Language for Computing on Encrypted Data (Invited
                  Talk)},
  booktitle    = {{IARCS} Annual Conference on Foundations of Software Technology and
                  Theoretical Computer Science, {FSTTCS} 2011, December 12-14, 2011,
                  Mumbai, India},
  series       = {LIPIcs},
  volume       = {13},
  pages        = {6--24},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2011},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2011.6},
  doi          = {10.4230/LIPICS.FSTTCS.2011.6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/BainMSSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haskell/StefanRMM11,
  author       = {Deian Stefan and
                  Alejandro Russo and
                  John C. Mitchell and
                  David Mazi{\`{e}}res},
  editor       = {Koen Claessen},
  title        = {Flexible dynamic information flow control in Haskell},
  booktitle    = {Proceedings of the 4th {ACM} {SIGPLAN} Symposium on Haskell, Haskell
                  2011, Tokyo, Japan, 22 September 2011},
  pages        = {95--106},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2034675.2034688},
  doi          = {10.1145/2034675.2034688},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haskell/StefanRMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/HinrichsGLSM11,
  author       = {Timothy L. Hinrichs and
                  William C. Garrison III and
                  Adam J. Lee and
                  Skip Saunders and
                  John C. Mitchell},
  editor       = {Gilles Barthe and
                  Anupam Datta and
                  Sandro Etalle},
  title        = {{TBA} : {A} Hybrid of Logic and Extensional Access Control Systems},
  booktitle    = {Formal Aspects of Security and Trust - 8th International Workshop,
                  {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7140},
  pages        = {198--213},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29420-4\_13},
  doi          = {10.1007/978-3-642-29420-4\_13},
  timestamp    = {Sat, 19 Oct 2019 20:16:12 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/HinrichsGLSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/StefanRMM11,
  author       = {Deian Stefan and
                  Alejandro Russo and
                  David Mazi{\`{e}}res and
                  John C. Mitchell},
  editor       = {Peeter Laud},
  title        = {Disjunction Category Labels},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {223--239},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_16},
  doi          = {10.1007/978-3-642-29615-4\_16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/StefanRMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sas/Mitchell11,
  author       = {John C. Mitchell},
  editor       = {Eran Yahav},
  title        = {Program Analysis for Web Security},
  booktitle    = {Static Analysis - 18th International Symposium, {SAS} 2011, Venice,
                  Italy, September 14-16, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6887},
  pages        = {4},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23702-7\_3},
  doi          = {10.1007/978-3-642-23702-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sas/Mitchell11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BurszteinBPPFM11,
  author       = {Elie Bursztein and
                  Romain Beauxis and
                  Hristo S. Paskov and
                  Daniele Perito and
                  Celine Fabry and
                  John C. Mitchell},
  title        = {The Failure of Noise-Based Non-continuous Audio Captchas},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {19--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.14},
  doi          = {10.1109/SP.2011.14},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BurszteinBPPFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TalyEMMN11,
  author       = {Ankur Taly and
                  {\'{U}}lfar Erlingsson and
                  John C. Mitchell and
                  Mark S. Miller and
                  Jasvir Nagra},
  title        = {Automated Analysis of Security-Critical JavaScript APIs},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {363--378},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.39},
  doi          = {10.1109/SP.2011.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/TalyEMMN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wollic/Mitchell11,
  author       = {John C. Mitchell},
  editor       = {Lev D. Beklemishev and
                  Ruy J. G. B. de Queiroz},
  title        = {A Symbolic Logic with Exact Bounds for Cryptographic Protocols},
  booktitle    = {Logic, Language, Information and Computation - 18th International
                  Workshop, WoLLIC 2011, Philadelphia, PA, USA, May 18-20, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6642},
  pages        = {3},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20920-8\_3},
  doi          = {10.1007/978-3-642-20920-8\_3},
  timestamp    = {Tue, 01 Jun 2021 15:22:31 +0200},
  biburl       = {https://dblp.org/rec/conf/wollic/Mitchell11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/DattaM0S11,
  author       = {Anupam Datta and
                  John C. Mitchell and
                  Arnab Roy and
                  Stephan Hyeonjun Stiller},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Protocol Composition Logic},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {182--221},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-182},
  doi          = {10.3233/978-1-60750-714-7-182},
  timestamp    = {Fri, 15 May 2020 12:11:04 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/DattaM0S11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BainMSSZ11,
  author       = {Alex Bain and
                  John C. Mitchell and
                  Rahul Sharma and
                  Deian Stefan and
                  Joe Zimmerman},
  title        = {A Domain-Specific Language for Computing on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {561},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/561},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BainMSSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RoyDDM10,
  author       = {Arnab Roy and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell},
  title        = {Inductive trace properties for computational security},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {6},
  pages        = {1035--1073},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-389},
  doi          = {10.3233/JCS-2009-389},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RoyDDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AkhaweBLMS10,
  author       = {Devdatta Akhawe and
                  Adam Barth and
                  Peifung E. Lam and
                  John C. Mitchell and
                  Dawn Song},
  title        = {Towards a Formal Foundation of Web Security},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {290--304},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.27},
  doi          = {10.1109/CSF.2010.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AkhaweBLMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BarthRSMSB10,
  author       = {Adam Barth and
                  Benjamin I. P. Rubinstein and
                  Mukund Sundararajan and
                  John C. Mitchell and
                  Dawn Song and
                  Peter L. Bartlett},
  editor       = {Radu Sion},
  title        = {A Learning-Based Approach to Reactive Security},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {192--206},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_16},
  doi          = {10.1007/978-3-642-14577-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BarthRSMSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BauM10,
  author       = {Jason Bau and
                  John C. Mitchell},
  title        = {A Security Evaluation of {DNSSEC} with {NSEC3}},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/security-evaluation-dnssec-nsec3},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BauM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MaffeisMT10,
  author       = {Sergio Maffeis and
                  John C. Mitchell and
                  Ankur Taly},
  title        = {Object Capabilities and Isolation of Untrusted Web Applications},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {125--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.16},
  doi          = {10.1109/SP.2010.16},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MaffeisMT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BauBGM10,
  author       = {Jason Bau and
                  Elie Bursztein and
                  Divij Gupta and
                  John C. Mitchell},
  title        = {State of the Art: Automated Black-Box Web Application Vulnerability
                  Testing},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {332--345},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.27},
  doi          = {10.1109/SP.2010.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BauBGM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BurszteinBFMJ10,
  author       = {Elie Bursztein and
                  Steven Bethard and
                  Celine Fabry and
                  John C. Mitchell and
                  Daniel Jurafsky},
  title        = {How Good Are Humans at Solving CAPTCHAs? {A} Large Scale Evaluation},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {399--413},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.31},
  doi          = {10.1109/SP.2010.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BurszteinBFMJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BriesemeisterDLSTDKSOM10,
  author       = {Linda Briesemeister and
                  Steven Dawson and
                  Patrick Lincoln and
                  Hassen Sa{\"{\i}}di and
                  Jim Thornton and
                  Glenn Durfee and
                  Peter C. S. Kwan and
                  Elizabeth Stinson and
                  Adam J. Oliner and
                  John C. Mitchell},
  editor       = {Nadav Aharony and
                  Yaniv Altshuler and
                  Yuval Elovici},
  title        = {Homogeneity as an Advantage: It Takes a Community to Protect an Application},
  booktitle    = {2010 Workshop on Collaborative Methods for Security and Privacy, CollSec'10,
                  Washington, D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/collsec10/homogeneity-advantage-it-takes-community-protect-application},
  timestamp    = {Mon, 01 Feb 2021 08:42:51 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BriesemeisterDLSTDKSOM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BurszteinGFBRBBM10,
  author       = {Elie Bursztein and
                  Baptiste Gourdin and
                  Celine Fabry and
                  Jason Bau and
                  Gustav Rydstedt and
                  Hristo Bojinov and
                  Dan Boneh and
                  John C. Mitchell},
  editor       = {Terry V. Benzel and
                  Jelena Mirkovic and
                  Angelos Stavrou},
  title        = {Webseclab Security Education Workbench},
  booktitle    = {3rd Workshop on Cyber Security Experimentation and Test, {CSET} '10,
                  Washington, D.C., USA, August 9, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/cset10/webseclab-security-education-workbench},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BurszteinGFBRBBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DattaDMNS10,
  author       = {Anupam Datta and
                  Nipun Dave and
                  John C. Mitchell and
                  Helen Nissenbaum and
                  Divya Sharma},
  editor       = {Kevin Fu and
                  Tadayoshi Kohno and
                  Aviel D. Rubin},
  title        = {Privacy Challenges in Patient-centric Health Information Systems},
  booktitle    = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10,
                  Washington, D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/healthsec10/privacy-challenges-patient-centric-health-information-systems},
  timestamp    = {Mon, 01 Feb 2021 08:43:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DattaDMNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BauM10,
  author       = {Jason Bau and
                  John C. Mitchell},
  title        = {A Security Evaluation of {DNSSEC} with {NSEC3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BauM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BarthJM09,
  author       = {Adam Barth and
                  Collin Jackson and
                  John C. Mitchell},
  title        = {Securing frame communication in browsers},
  journal      = {Commun. {ACM}},
  volume       = {52},
  number       = {6},
  pages        = {83--91},
  year         = {2009},
  url          = {https://doi.org/10.1145/1516046.1516066},
  doi          = {10.1145/1516046.1516066},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BarthJM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BurszteinLM09,
  author       = {Elie Bursztein and
                  Peifung E. Lam and
                  John C. Mitchell},
  editor       = {Radu Sion and
                  Dawn Song},
  title        = {TrackBack spam: abuse and prevention},
  booktitle    = {Proceedings of the first {ACM} Cloud Computing Security Workshop,
                  {CCSW} 2009, Chicago, IL, USA, November 13, 2009},
  pages        = {3--10},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655008.1655010},
  doi          = {10.1145/1655008.1655010},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BurszteinLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/BurszteinM09,
  author       = {Elie Bursztein and
                  John C. Mitchell},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Using Strategy Objectives for Network Security Analysis},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {337--349},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_25},
  doi          = {10.1007/978-3-642-16342-5\_25},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/BurszteinM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MaffeisMT09,
  author       = {Sergio Maffeis and
                  John C. Mitchell and
                  Ankur Taly},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Isolating JavaScript with Filters, Rewriting, and Wrappers},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {505--522},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_31},
  doi          = {10.1007/978-3-642-04444-1\_31},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MaffeisMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/HinrichsGCMS09,
  author       = {Timothy L. Hinrichs and
                  Natasha Gude and
                  Mart{\'{\i}}n Casado and
                  John C. Mitchell and
                  Scott Shenker},
  editor       = {Jeffrey C. Mogul},
  title        = {Practical declarative network management},
  booktitle    = {Proceedings of the 1st {ACM} {SIGCOMM} 2009 Workshop on Research on
                  Enterprise Networking, {WREN} 2009, Barcelona, Spain, August 21, 2009},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1592681.1592683},
  doi          = {10.1145/1592681.1592683},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/HinrichsGCMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/LamMS09,
  author       = {Peifung E. Lam and
                  John C. Mitchell and
                  Sharada Sundaram},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {A Formalization of {HIPAA} for a Medical Messaging System},
  booktitle    = {Trust, Privacy and Security in Digital Business, 6th International
                  Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5695},
  pages        = {73--85},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03748-1\_8},
  doi          = {10.1007/978-3-642-03748-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/LamMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2009P9073,
  editor       = {Ruth Breu and
                  John C. Mitchell and
                  Janos Sztipanovits and
                  Alfred Winter},
  title        = {Model-Based Design of Trustworthy Health Information Systems, 11.02.
                  - 14.02.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09073},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/portals/09073/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2009P9073.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BreuMSW09,
  author       = {Ruth Breu and
                  John C. Mitchell and
                  Janos Sztipanovits and
                  Alfred Winter},
  editor       = {Ruth Breu and
                  John C. Mitchell and
                  Janos Sztipanovits and
                  Alfred Winter},
  title        = {09073 Abstracts Collection - Model-Based Design of Trustworthy Health
                  Information Systems},
  booktitle    = {Model-Based Design of Trustworthy Health Information Systems, 11.02.
                  - 14.02.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09073},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1998/},
  timestamp    = {Thu, 10 Jun 2021 13:02:05 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BreuMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0912-1155,
  author       = {Adam Barth and
                  Benjamin I. P. Rubinstein and
                  Mukund Sundararajan and
                  John C. Mitchell and
                  Dawn Xiaodong Song and
                  Peter L. Bartlett},
  title        = {A Learning-Based Approach to Reactive Security},
  journal      = {CoRR},
  volume       = {abs/0912.1155},
  year         = {2009},
  url          = {http://arxiv.org/abs/0912.1155},
  eprinttype    = {arXiv},
  eprint       = {0912.1155},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0912-1155.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KustersDMR08,
  author       = {Ralf K{\"{u}}sters and
                  Anupam Datta and
                  John C. Mitchell and
                  Ajith Ramanathan},
  title        = {On the Relationships between Notions of Simulation-Based Security},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {4},
  pages        = {492--546},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-008-9019-9},
  doi          = {10.1007/S00145-008-9019-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KustersDMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MitchellRRS08,
  author       = {John C. Mitchell and
                  Arnab Roy and
                  Paul D. Rowe and
                  Andre Scedrov},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Analysis of {EAP-GPSK} Authentication Protocol},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {309--327},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_19},
  doi          = {10.1007/978-3-540-68914-0\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MitchellRRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aplas/MaffeisMT08,
  author       = {Sergio Maffeis and
                  John C. Mitchell and
                  Ankur Taly},
  editor       = {G. Ramalingam},
  title        = {An Operational Semantics for JavaScript},
  booktitle    = {Programming Languages and Systems, 6th Asian Symposium, {APLAS} 2008,
                  Bangalore, India, December 9-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5356},
  pages        = {307--325},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89330-1\_22},
  doi          = {10.1007/978-3-540-89330-1\_22},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aplas/MaffeisMT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BarthJM08,
  author       = {Adam Barth and
                  Collin Jackson and
                  John C. Mitchell},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Robust defenses for cross-site request forgery},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {75--88},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455782},
  doi          = {10.1145/1455770.1455782},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BarthJM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MartignoniSFJM08,
  author       = {Lorenzo Martignoni and
                  Elizabeth Stinson and
                  Matt Fredrikson and
                  Somesh Jha and
                  John C. Mitchell},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {A Layered Architecture for Detecting Malicious Behaviors},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {78--97},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_5},
  doi          = {10.1007/978-3-540-87403-4\_5},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MartignoniSFJM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BarthJM08,
  author       = {Adam Barth and
                  Collin Jackson and
                  John C. Mitchell},
  editor       = {Paul C. van Oorschot},
  title        = {Securing Frame Communication in Browsers},
  booktitle    = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August
                  1, 2008, San Jose, CA, {USA}},
  pages        = {17--30},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/sec08/tech/full\_papers/barth/barth.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BarthJM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StinsonM08,
  author       = {Elizabeth Stinson and
                  John C. Mitchell},
  editor       = {Dan Boneh and
                  Tal Garfinkel and
                  Dug Song},
  title        = {Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection
                  Methods},
  booktitle    = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose,
                  CA, USA, July 28, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/woot08/tech/full\_papers/stinson/stinson.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StinsonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MitchellRS09,
  author       = {John C. Mitchell and
                  Arnab Roy and
                  Mukund Sundararajan},
  editor       = {Daniel J. Dougherty and
                  Santiago Escobar},
  title        = {An Automated Approach for Proving {PCL} Invariants},
  booktitle    = {Proceedings of the Third International Workshop on Security and Rewriting
                  Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {234},
  pages        = {93--113},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.02.074},
  doi          = {10.1016/J.ENTCS.2009.02.074},
  timestamp    = {Thu, 09 Mar 2023 12:59:09 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/MitchellRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/StinsonM08,
  author       = {Elizabeth Stinson and
                  John C. Mitchell},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Characterizing Bots' Remote Control Behavior},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {45--64},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_3},
  doi          = {10.1007/978-0-387-68768-1\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/StinsonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BarthMDS07,
  author       = {Adam Barth and
                  John C. Mitchell and
                  Anupam Datta and
                  Sharada Sundaram},
  title        = {Privacy and Utility in Business Processes},
  booktitle    = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8
                  July 2007, Venice, Italy},
  pages        = {279--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CSF.2007.26},
  doi          = {10.1109/CSF.2007.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BarthMDS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/StinsonM07,
  author       = {Elizabeth Stinson and
                  John C. Mitchell},
  editor       = {Bernhard M. H{\"{a}}mmerli and
                  Robin Sommer},
  title        = {Characterizing Bots' Remote Control Behavior},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  4th International Conference, {DIMVA} 2007, Lucerne, Switzerland,
                  July 12-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4579},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73614-1\_6},
  doi          = {10.1007/978-3-540-73614-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/StinsonM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RoyDDM07,
  author       = {Arnab Roy and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Inductive Proofs of Computational Secrecy},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {219--234},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_15},
  doi          = {10.1007/978-3-540-74835-9\_15},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RoyDDM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/RoyDM07,
  author       = {Arnab Roy and
                  Anupam Datta and
                  John C. Mitchell},
  editor       = {Gilles Barthe and
                  C{\'{e}}dric Fournet},
  title        = {Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols},
  booktitle    = {Trustworthy Global Computing, Third Symposium, {TGC} 2007, Sophia-Antipolis,
                  France, November 5-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4912},
  pages        = {312--329},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78663-4\_21},
  doi          = {10.1007/978-3-540-78663-4\_21},
  timestamp    = {Sat, 19 Oct 2019 20:09:31 +0200},
  biburl       = {https://dblp.org/rec/conf/tgc/RoyDM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JacksonBM07,
  author       = {Collin Jackson and
                  Dan Boneh and
                  John C. Mitchell},
  title        = {Transaction Generators: Root Kits for Web},
  booktitle    = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston,
                  MA, USA, August 7, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/hotsec-07/transaction-generators-root-kits-web},
  timestamp    = {Mon, 01 Feb 2021 08:42:51 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JacksonBM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DattaDMR07,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Arnab Roy},
  editor       = {Luca Cardelli and
                  Marcelo Fiore and
                  Glynn Winskel},
  title        = {Protocol Composition Logic {(PCL)}},
  booktitle    = {Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {172},
  pages        = {311--358},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.02.012},
  doi          = {10.1016/J.ENTCS.2007.02.012},
  timestamp    = {Tue, 24 Jan 2023 11:36:28 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DattaDMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyDDM07,
  author       = {Arnab Roy and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell},
  title        = {Inductive Proof Method for Computational Secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyDDM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LiM06,
  author       = {Ninghui Li and
                  John C. Mitchell},
  title        = {Understanding {SPKI/SDSI} using first-order logic},
  journal      = {Int. J. Inf. Sec.},
  volume       = {5},
  number       = {1},
  pages        = {48--64},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10207-005-0073-0},
  doi          = {10.1007/S10207-005-0073-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LiM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/MitchellRST06,
  author       = {John C. Mitchell and
                  Ajith Ramanathan and
                  Andre Scedrov and
                  Vanessa Teague},
  title        = {A probabilistic polynomial-time process calculus for the analysis
                  of cryptographic protocols},
  journal      = {Theor. Comput. Sci.},
  volume       = {353},
  number       = {1-3},
  pages        = {118--164},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2005.10.044},
  doi          = {10.1016/J.TCS.2005.10.044},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/MitchellRST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BackesDDMT06,
  author       = {Michael Backes and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Mathieu Turuani},
  title        = {Compositional analysis of contract-signing protocols},
  journal      = {Theor. Comput. Sci.},
  volume       = {367},
  number       = {1-2},
  pages        = {33--56},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2006.08.039},
  doi          = {10.1016/J.TCS.2006.08.039},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/BackesDDMT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/RoyDDMS06,
  author       = {Arnab Roy and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Jean{-}Pierre Seifert},
  editor       = {Mitsu Okada and
                  Ichiro Satoh},
  title        = {Secrecy Analysis in Protocol Composition Logic},
  booktitle    = {Advances in Computer Science - {ASIAN} 2006. Secure Software and Related
                  Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December
                  6-8, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4435},
  pages        = {197--213},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-77505-8\_15},
  doi          = {10.1007/978-3-540-77505-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/RoyDDMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DattaDMW06,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Bogdan Warinschi},
  title        = {Computationally Sound Compositional Logic for Key Exchange Protocols},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {321--334},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.9},
  doi          = {10.1109/CSFW.2006.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DattaDMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/BarthM06,
  author       = {Adam Barth and
                  John C. Mitchell},
  title        = {Managing Digital Rights using Linear Logic},
  booktitle    = {21th {IEEE} Symposium on Logic in Computer Science {(LICS} 2006),
                  12-15 August 2006, Seattle, WA, USA, Proceedings},
  pages        = {127--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/LICS.2006.32},
  doi          = {10.1109/LICS.2006.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/BarthM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BarthDMN06,
  author       = {Adam Barth and
                  Anupam Datta and
                  John C. Mitchell and
                  Helen Nissenbaum},
  title        = {Privacy and Contextual Integrity: Framework and Applications},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {184--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.32},
  doi          = {10.1109/SP.2006.32},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BarthDMN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DattaDMRS06,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Ajith Ramanathan and
                  Andre Scedrov},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Games and the Impossibility of Realizable Ideal Functionality},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {360--379},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_19},
  doi          = {10.1007/11681878\_19},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DattaDMRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/JacksonBBM06a,
  author       = {Collin Jackson and
                  Andrew Bortz and
                  Dan Boneh and
                  John C. Mitchell},
  editor       = {Les Carr and
                  David De Roure and
                  Arun Iyengar and
                  Carole A. Goble and
                  Michael Dahlin},
  title        = {Protecting browser state from web privacy attacks},
  booktitle    = {Proceedings of the 15th international conference on World Wide Web,
                  {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006},
  pages        = {737--744},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1135777.1135884},
  doi          = {10.1145/1135777.1135884},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/JacksonBBM06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDMW06,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Bogdan Warinschi},
  title        = {Key Exchange Protocols: Security Definition, Proof Method and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaKMR06,
  author       = {Anupam Datta and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell and
                  Ajith Ramanathan},
  title        = {On the Relationships Between Notions of Simulation-Based Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaKMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyDDM06,
  author       = {Arnab Roy and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell},
  title        = {Inductive Trace Properties for Computational Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyDDM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/LiMW05,
  author       = {Ninghui Li and
                  John C. Mitchell and
                  William H. Winsborough},
  title        = {Beyond proof-of-compliance: security analysis in trust management},
  journal      = {J. {ACM}},
  volume       = {52},
  number       = {3},
  pages        = {474--514},
  year         = {2005},
  url          = {https://doi.org/10.1145/1066100.1066103},
  doi          = {10.1145/1066100.1066103},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/LiMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DattaDMP05,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Dusko Pavlovic},
  title        = {A derivation system and compositional logic for security protocols},
  journal      = {J. Comput. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {423--482},
  year         = {2005},
  url          = {https://doi.org/10.3233/jcs-2005-13304},
  doi          = {10.3233/JCS-2005-13304},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DattaDMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/ChadhaMSS05,
  author       = {Rohit Chadha and
                  John C. Mitchell and
                  Andre Scedrov and
                  Vitaly Shmatikov},
  title        = {Contract signing, optimism, and advantage},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {189--218},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.003},
  doi          = {10.1016/J.JLAP.2004.09.003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jlp/ChadhaMSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeSDDM05,
  author       = {Changhua He and
                  Mukund Sundararajan and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {A modular correctness proof of {IEEE} 802.11i and {TLS}},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {2--15},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102124},
  doi          = {10.1145/1102120.1102124},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HeSDDM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesDDMT05,
  author       = {Michael Backes and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Mathieu Turuani},
  title        = {Compositional Analysis of Contract Signing Protocols},
  booktitle    = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005),
                  20-22 June 2005, Aix-en-Provence, France},
  pages        = {94--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSFW.2005.12},
  doi          = {10.1109/CSFW.2005.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesDDMT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/DattaDMST05,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Vitaly Shmatikov and
                  Mathieu Turuani},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Probabilistic Polynomial-Time Semantics for a Protocol Security Logic},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_2},
  doi          = {10.1007/11523468\_2},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/DattaDMST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HeM05,
  author       = {Changhua He and
                  John C. Mitchell},
  title        = {Security Analysis and Improvements for {IEEE} 802.11i},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2005, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2005},
  url          = {https://www.ndss-symposium.org/ndss2005/security-analysis-and-improvements-ieee-80211i/},
  timestamp    = {Mon, 01 Feb 2021 08:42:12 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HeM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/BarthM05,
  author       = {Adam Barth and
                  John C. Mitchell},
  editor       = {Catherine Meadows},
  title        = {Enterprise privacy promises and enforcement},
  booktitle    = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  pages        = {58--66},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1045405.1045412},
  doi          = {10.1145/1045405.1045412},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/BarthM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppdp/Mitchell05,
  author       = {John C. Mitchell},
  editor       = {Pedro Barahona and
                  Amy P. Felty},
  title        = {Security analysis of network protocols: logical and computational
                  methods},
  booktitle    = {Proceedings of the 7th International {ACM} {SIGPLAN} Conference on
                  Principles and Practice of Declarative Programming, July 11-13 2005,
                  Lisbon, Portugal},
  pages        = {151--152},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1069774.1069788},
  doi          = {10.1145/1069774.1069788},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ppdp/Mitchell05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DattaKMR05,
  author       = {Anupam Datta and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell and
                  Ajith Ramanathan},
  editor       = {Joe Kilian},
  title        = {On the Relationships Between Notions of Simulation-Based Security},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {476--494},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_26},
  doi          = {10.1007/978-3-540-30576-7\_26},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DattaKMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RossJMBM05,
  author       = {Blake Ross and
                  Collin Jackson and
                  Nick Miyake and
                  Dan Boneh and
                  John C. Mitchell},
  editor       = {Patrick D. McDaniel},
  title        = {Stronger Password Authentication Using Browser Extensions},
  booktitle    = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
                  USA, July 31 - August 5, 2005},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {https://www.usenix.org/conference/14th-usenix-security-symposium/stronger-password-authentication-using-browser-extensions},
  timestamp    = {Mon, 01 Feb 2021 08:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RossJMBM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2005fmse,
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-231-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2005fmse.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDMRS05,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Ajith Ramanathan and
                  Andre Scedrov},
  title        = {Games and the Impossibility of Realizable Ideal Functionality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDMRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChanderDM04,
  author       = {Ajay Chander and
                  Drew Dean and
                  John C. Mitchell},
  title        = {Reconstructing Trust Management},
  journal      = {J. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {131--164},
  year         = {2004},
  url          = {https://doi.org/10.3233/jcs-2004-12106},
  doi          = {10.3233/JCS-2004-12106},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ChanderDM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DurginLM04,
  author       = {Nancy A. Durgin and
                  Patrick Lincoln and
                  John C. Mitchell},
  title        = {Multiset rewriting and the complexity of bounded security protocols},
  journal      = {J. Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {247--311},
  year         = {2004},
  url          = {https://doi.org/10.3233/jcs-2004-12203},
  doi          = {10.3233/JCS-2004-12203},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DurginLM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiMT04,
  author       = {Ninghui Li and
                  John C. Mitchell and
                  Derrick Tong},
  title        = {Securing Java RMI-Based Distributed Applications},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {262--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.34},
  doi          = {10.1109/CSAC.2004.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiMT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DattaDMP04,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Dusko Pavlovic},
  title        = {Abstraction and Refinement in Protocol Derivation},
  booktitle    = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004),
                  28-30 June 2004, Pacific Grove, CA, {USA}},
  pages        = {30},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.4},
  doi          = {10.1109/CSFW.2004.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DattaDMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/RamanathanMST04,
  author       = {Ajith Ramanathan and
                  John C. Mitchell and
                  Andre Scedrov and
                  Vanessa Teague},
  editor       = {Igor Walukiewicz},
  title        = {Probabilistic Bisimulation and Equivalence for Security Analysis of
                  Network Protocols},
  booktitle    = {Foundations of Software Science and Computation Structures, 7th International
                  Conference, {FOSSACS} 2004, Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2004, Barcelona, Spain,
                  March 29 - April 2, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2987},
  pages        = {468--483},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24727-2\_33},
  doi          = {10.1007/978-3-540-24727-2\_33},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/RamanathanMST04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChanderDM04,
  author       = {Ajay Chander and
                  Drew Dean and
                  John C. Mitchell},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {A Distributed High Assurance Reference Monitor},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {231--244},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_20},
  doi          = {10.1007/978-3-540-30144-8\_20},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ChanderDM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChouLTM04,
  author       = {Neil Chou and
                  Robert Ledesma and
                  Yuka Teraguchi and
                  John C. Mitchell},
  title        = {Client-Side Defense Against Web-Based Identity Theft},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2004, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2004},
  url          = {https://www.ndss-symposium.org/ndss2004/client-side-defense-against-web-based-identity-theft/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ChouLTM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BarthMR04,
  author       = {Adam Barth and
                  John C. Mitchell and
                  Justin Rosenstein},
  editor       = {Vijay Atluri and
                  Paul F. Syverson and
                  Sabrina De Capitani di Vimercati},
  title        = {Conflict and combination in privacy policy languages},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2004, Washington, DC, USA, October 28, 2004},
  pages        = {45--46},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029179.1029195},
  doi          = {10.1145/1029179.1029195},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/BarthMR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/HeM04,
  author       = {Changhua He and
                  John C. Mitchell},
  editor       = {Markus Jakobsson and
                  Adrian Perrig},
  title        = {Analysis of the 802.11i 4-way handshake},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Wireless Security, Philadelphia,
                  PA, USA, October 1, 2004},
  pages        = {43--50},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1023646.1023655},
  doi          = {10.1145/1023646.1023655},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/HeM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifipTCS/2004,
  editor       = {Jean{-}Jacques L{\'{e}}vy and
                  Ernst W. Mayr and
                  John C. Mitchell},
  title        = {Exploring New Frontiers of Theoretical Informatics, {IFIP} 18th World
                  Computer Congress, {TC1} 3rd International Conference on Theoretical
                  Computer Science (TCS2004), 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {155},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b98989},
  doi          = {10.1007/B98989},
  isbn         = {1-4020-8140-5},
  timestamp    = {Fri, 27 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifipTCS/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0007317,
  author       = {John C. Mitchell},
  title        = {Concepts in programming languages},
  publisher    = {Cambridge University Press},
  year         = {2003},
  isbn         = {978-0-521-78098-8},
  timestamp    = {Thu, 03 Feb 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0007317.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/FreundM03,
  author       = {Stephen N. Freund and
                  John C. Mitchell},
  title        = {A Type System for the Java Bytecode Language and Verifier},
  journal      = {J. Autom. Reason.},
  volume       = {30},
  number       = {3-4},
  pages        = {271--321},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1025011624925},
  doi          = {10.1023/A:1025011624925},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/FreundM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LiWM03,
  author       = {Ninghui Li and
                  William H. Winsborough and
                  John C. Mitchell},
  title        = {Distributed Credential Chain Discovery in Trust Management},
  journal      = {J. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {35--86},
  year         = {2003},
  url          = {https://doi.org/10.3233/jcs-2003-11102},
  doi          = {10.3233/JCS-2003-11102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LiWM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DurginMP03,
  author       = {Nancy A. Durgin and
                  John C. Mitchell and
                  Dusko Pavlovic},
  title        = {A Compositional Logic for Proving Security Properties of Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {677--722},
  year         = {2003},
  url          = {https://doi.org/10.3233/jcs-2003-11407},
  doi          = {10.3233/JCS-2003-11407},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DurginMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/DebbabiDMM03,
  author       = {Mourad Debbabi and
                  Nancy A. Durgin and
                  Mohamed Mejri and
                  John C. Mitchell},
  title        = {Security by typing},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {4},
  number       = {4},
  pages        = {472--495},
  year         = {2003},
  url          = {https://doi.org/10.1007/s10009-002-0100-7},
  doi          = {10.1007/S10009-002-0100-7},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/DebbabiDMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DattaDMP03,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Dusko Pavlovic},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Secure protocol composition},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {11--23},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035431},
  doi          = {10.1145/1035429.1035431},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DattaDMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesMM03,
  author       = {Michael Backes and
                  Catherine Meadows and
                  John C. Mitchell},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Relating cryptography and formal methods: a panel},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {61--66},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035436},
  doi          = {10.1145/1035429.1035436},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/MateusMS03,
  author       = {Paulo Mateus and
                  John C. Mitchell and
                  Andre Scedrov},
  editor       = {Roberto M. Amadio and
                  Denis Lugiez},
  title        = {Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time
                  Process Calculus},
  booktitle    = {{CONCUR} 2003 - Concurrency Theory, 14th International Conference,
                  Marseille, France, September 3-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2761},
  pages        = {323--345},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45187-7\_22},
  doi          = {10.1007/978-3-540-45187-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/MateusMS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/ChadhaMSS03,
  author       = {Rohit Chadha and
                  John C. Mitchell and
                  Andre Scedrov and
                  Vitaly Shmatikov},
  editor       = {Roberto M. Amadio and
                  Denis Lugiez},
  title        = {Contract Signing, Optimism, and Advantage},
  booktitle    = {{CONCUR} 2003 - Concurrency Theory, 14th International Conference,
                  Marseille, France, September 3-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2761},
  pages        = {361--377},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45187-7\_24},
  doi          = {10.1007/978-3-540-45187-7\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/ChadhaMSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LiM03,
  author       = {Ninghui Li and
                  John C. Mitchell},
  title        = {Understanding {SPKI/SDSI} Using First-Order Logic},
  booktitle    = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003),
                  30 June - 2 July 2003, Pacific Grove, CA, {USA}},
  pages        = {89},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSFW.2003.1212707},
  doi          = {10.1109/CSFW.2003.1212707},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/LiM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DattaDMP03,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Dusko Pavlovic},
  title        = {A Derivation System for Security Protocols and its Logical Formalization},
  booktitle    = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003),
                  30 June - 2 July 2003, Pacific Grove, CA, {USA}},
  pages        = {109--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSFW.2003.1212708},
  doi          = {10.1109/CSFW.2003.1212708},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DattaDMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/discex/LiM03,
  author       = {Ninghui Li and
                  John C. Mitchell},
  title        = {A Role-based Trust-management Framework},
  booktitle    = {3rd {DARPA} Information Survivability Conference and Exposition {(DISCEX-III}
                  2003), 22-24 April 2003, Washington, DC, {USA}},
  pages        = {201},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DISCEX.2003.1194885},
  doi          = {10.1109/DISCEX.2003.1194885},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/discex/LiM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfps/DattaDMP03,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Dusko Pavlovic},
  editor       = {Stephen D. Brookes and
                  Prakash Panangaden},
  title        = {Secure Protocol Composition},
  booktitle    = {Proceedings of 19th Conference on the Mathematical Foundations of
                  Programming Semantics, {MFPS} 2003, Universit{\'{e}} de Montr{\'{e}}al,
                  QC, Canada, March 19-22, 2003},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {83},
  pages        = {201--226},
  publisher    = {Elsevier},
  year         = {2003},
  url          = {https://doi.org/10.1016/S1571-0661(03)50011-1},
  doi          = {10.1016/S1571-0661(03)50011-1},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mfps/DattaDMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/padl/LiM03,
  author       = {Ninghui Li and
                  John C. Mitchell},
  editor       = {Ver{\'{o}}nica Dahl and
                  Philip Wadler},
  title        = {{DATALOG} with Constraints: {A} Foundation for Trust Management Languages},
  booktitle    = {Practical Aspects of Declarative Languages, 5th International Symposium,
                  {PADL} 2003, New Orleans, LA, USA, January 13-14, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2562},
  pages        = {58--73},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36388-2\_6},
  doi          = {10.1007/3-540-36388-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/padl/LiM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiWM03,
  author       = {Ninghui Li and
                  William H. Winsborough and
                  John C. Mitchell},
  title        = {Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust
                  Management},
  booktitle    = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
                  May 2003, Berkeley, CA, {USA}},
  pages        = {123--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199332},
  doi          = {10.1109/SECPRI.2003.1199332},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiWM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LieMTH03,
  author       = {David Lie and
                  John C. Mitchell and
                  Chandramohan A. Thekkath and
                  Mark Horowitz},
  title        = {Specifying and Verifying Hardware for Tamper-Resistant Software},
  booktitle    = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
                  May 2003, Berkeley, CA, {USA}},
  pages        = {166},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199335},
  doi          = {10.1109/SECPRI.2003.1199335},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LieMTH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ShmatikovM02,
  author       = {Vitaly Shmatikov and
                  John C. Mitchell},
  title        = {Finite-state analysis of two contract signing protocols},
  journal      = {Theor. Comput. Sci.},
  volume       = {283},
  number       = {2},
  pages        = {419--450},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0304-3975(01)00141-4},
  doi          = {10.1016/S0304-3975(01)00141-4},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ShmatikovM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isss2/MitchellT02,
  author       = {John C. Mitchell and
                  Vanessa Teague},
  editor       = {Mitsuhiro Okada and
                  Benjamin C. Pierce and
                  Andre Scedrov and
                  Hideyuki Tokuda and
                  Akinori Yonezawa},
  title        = {Autonomous Nodes and Distributed Mechanisms},
  booktitle    = {Software Security -- Theories and Systems, Mext-NSF-JSPS International
                  Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2609},
  pages        = {58--83},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36532-X\_5},
  doi          = {10.1007/3-540-36532-X\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/isss2/MitchellT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isss2/CervesatoDLMS02,
  author       = {Iliano Cervesato and
                  Nancy A. Durgin and
                  Patrick Lincoln and
                  John C. Mitchell and
                  Andre Scedrov},
  editor       = {Mitsuhiro Okada and
                  Benjamin C. Pierce and
                  Andre Scedrov and
                  Hideyuki Tokuda and
                  Akinori Yonezawa},
  title        = {A Comparison between Strand Spaces and Multiset Rewriting for Security
                  Protocol Analysis},
  booktitle    = {Software Security -- Theories and Systems, Mext-NSF-JSPS International
                  Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2609},
  pages        = {356--383},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36532-X\_22},
  doi          = {10.1007/3-540-36532-X\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isss2/CervesatoDLMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/Mitchell02,
  author       = {John C. Mitchell},
  editor       = {Sophie Tison},
  title        = {Multiset Rewriting and Security Protocol Analysis},
  booktitle    = {Rewriting Techniques and Applications, 13th International Conference,
                  {RTA} 2002, Copenhagen, Denmark, July 22-24, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2378},
  pages        = {19--22},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45610-4\_2},
  doi          = {10.1007/3-540-45610-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/Mitchell02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiMW02,
  author       = {Ninghui Li and
                  John C. Mitchell and
                  William H. Winsborough},
  title        = {Design of a Role-Based Trust-Management Framework},
  booktitle    = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 12-15, 2002},
  pages        = {114--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SECPRI.2002.1004366},
  doi          = {10.1109/SECPRI.2002.1004366},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiMW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/popl/2002,
  editor       = {John Launchbury and
                  John C. Mitchell},
  title        = {Conference Record of {POPL} 2002: The 29th {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, Portland, OR, USA, January
                  16-18, 2002},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/503272},
  doi          = {10.1145/503272},
  isbn         = {1-58113-450-9},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiWM01,
  author       = {Ninghui Li and
                  William H. Winsborough and
                  John C. Mitchell},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Distributed credential chain discovery in trust management: extended
                  abstract},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {156--165},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502005},
  doi          = {10.1145/501983.502005},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiWM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChanderMD01,
  author       = {Ajay Chander and
                  John C. Mitchell and
                  Drew Dean},
  title        = {A State-Transition Model of Trust Management and Access Control},
  booktitle    = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001),
                  11-13 June 2001, Cape Breton, Nova Scotia, Canada},
  pages        = {27--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CSFW.2001.930134},
  doi          = {10.1109/CSFW.2001.930134},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChanderMD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DurginMP01,
  author       = {Nancy A. Durgin and
                  John C. Mitchell and
                  Dusko Pavlovic},
  title        = {A Compositional Logic for Protocol Correctness},
  booktitle    = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001),
                  11-13 June 2001, Cape Breton, Nova Scotia, Canada},
  pages        = {241--255},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CSFW.2001.930150},
  doi          = {10.1109/CSFW.2001.930150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DurginMP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/Mitchell01,
  author       = {John C. Mitchell},
  editor       = {David Sands},
  title        = {Probabilistic Polynomial-Time Process Calculus and Security Protocol
                  Analysis},
  booktitle    = {Programming Languages and Systems, 10th European Symposium on Programming,
                  {ESOP} 2001 Held as Part of the Joint European Conferences on Theory
                  and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2028},
  pages        = {23--29},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45309-1\_2},
  doi          = {10.1007/3-540-45309-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/Mitchell01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/MitchellRST01,
  author       = {John C. Mitchell and
                  Ajith Ramanathan and
                  Andre Scedrov and
                  Vanessa Teague},
  title        = {Probabilistic Polynominal-Time Process Calculus and Security Protocol
                  Analysis},
  booktitle    = {16th Annual {IEEE} Symposium on Logic in Computer Science, Boston,
                  Massachusetts, USA, June 16-19, 2001, Proceedings},
  pages        = {3--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/LICS.2001.932477},
  doi          = {10.1109/LICS.2001.932477},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/MitchellRST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/Mitchell01,
  author       = {John C. Mitchell},
  editor       = {Chris Hankin and
                  Dave Schmidt},
  title        = {Programming language methods in computer security},
  booktitle    = {Conference Record of {POPL} 2001: The 28th {ACM} {SIGPLAN-SIGACT}
                  Symposium on Principles of Programming Languages, London, UK, January
                  17-19, 2001},
  pages        = {1--3},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/360204.360205},
  doi          = {10.1145/360204.360205},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/Mitchell01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MitchellRST01,
  author       = {John C. Mitchell and
                  Ajith Ramanathan and
                  Andre Scedrov and
                  Vanessa Teague},
  editor       = {Stephen D. Brookes and
                  Michael W. Mislove},
  title        = {A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic
                  Protocols (Preliminary Report)},
  booktitle    = {Seventeenth Conference on the Mathematical Foundations of Programming
                  Semantics, {MFPS} 2001, Aarhus, Denmark, May 23-26, 2001},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {45},
  pages        = {280--310},
  publisher    = {Elsevier},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0661(04)80968-X},
  doi          = {10.1016/S1571-0661(04)80968-X},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/MitchellRST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/LieTMLBMH00,
  author       = {David Lie and
                  Chandramohan A. Thekkath and
                  Mark Mitchell and
                  Patrick Lincoln and
                  Dan Boneh and
                  John C. Mitchell and
                  Mark Horowitz},
  editor       = {Larry Rudolph and
                  Anoop Gupta},
  title        = {Architectural Support for Copy and Tamper Resistant Software},
  booktitle    = {{ASPLOS-IX} Proceedings of the 9th International Conference on Architectural
                  Support for Programming Languages and Operating Systems, Cambridge,
                  MA, USA, November 12-15, 2000},
  pages        = {168--177},
  publisher    = {{ACM} Press},
  year         = {2000},
  url          = {https://doi.org/10.1145/378993.379237},
  doi          = {10.1145/378993.379237},
  timestamp    = {Wed, 07 Jul 2021 13:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/LieTMLBMH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CervesatoDMLS00,
  author       = {Iliano Cervesato and
                  Nancy A. Durgin and
                  John C. Mitchell and
                  Patrick Lincoln and
                  Andre Scedrov},
  title        = {Relating Strands and Multiset Rewriting for Security Protocol Analysis},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {35--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856924},
  doi          = {10.1109/CSFW.2000.856924},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CervesatoDMLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ShmatikovM00,
  author       = {Vitaly Shmatikov and
                  John C. Mitchell},
  editor       = {Yair Frankel},
  title        = {Analysis of Abuse-Free Contract Signing},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {174--191},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_13},
  doi          = {10.1007/3-540-45472-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ShmatikovM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ShmatikovM00,
  author       = {Vitaly Shmatikov and
                  John C. Mitchell},
  title        = {Analysis of a Fair Exchange Protocol},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2000, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2000},
  url          = {https://www.ndss-symposium.org/ndss2000/analysis-fair-exchange-protocol-paper/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ShmatikovM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/HarperM99,
  author       = {Robert Harper and
                  John C. Mitchell},
  title        = {Parametricity and Variants of Girard's \emph{J} Operator},
  journal      = {Inf. Process. Lett.},
  volume       = {70},
  number       = {1},
  pages        = {1--5},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0020-0190(99)00036-8},
  doi          = {10.1016/S0020-0190(99)00036-8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/HarperM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LincolnMS99,
  author       = {Patrick Lincoln and
                  John C. Mitchell and
                  Andre Scedrov},
  title        = {Optimization Complexity of Linear Logic Proof Games},
  journal      = {Theor. Comput. Sci.},
  volume       = {227},
  number       = {1-2},
  pages        = {299--331},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0304-3975(99)00057-2},
  doi          = {10.1016/S0304-3975(99)00057-2},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/LincolnMS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/FreundM99,
  author       = {Stephen N. Freund and
                  John C. Mitchell},
  title        = {The type system for object initializatiion in the Jave bytecode language},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {21},
  number       = {6},
  pages        = {1196--1250},
  year         = {1999},
  url          = {https://doi.org/10.1145/330643.330646},
  doi          = {10.1145/330643.330646},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/FreundM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CervesatoDLMS99,
  author       = {Iliano Cervesato and
                  Nancy A. Durgin and
                  Patrick Lincoln and
                  John C. Mitchell and
                  Andre Scedrov},
  title        = {A Meta-Notation for Protocol Analysis},
  booktitle    = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} 1999, Mordano, Italy, June 28-30, 1999},
  pages        = {55--69},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSFW.1999.779762},
  doi          = {10.1109/CSFW.1999.779762},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CervesatoDLMS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/LincolnMMS99,
  author       = {Patrick Lincoln and
                  John C. Mitchell and
                  Mark Mitchell and
                  Andre Scedrov},
  editor       = {Jeannette M. Wing and
                  Jim Woodcock and
                  Jim Davies},
  title        = {Probabilistic Polynomial-Time Equivalence and Security Analysis},
  booktitle    = {FM'99 - Formal Methods, World Congress on Formal Methods in the Development
                  of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings,
                  Volume {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1708},
  pages        = {776--793},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48119-2\_43},
  doi          = {10.1007/3-540-48119-2\_43},
  timestamp    = {Fri, 17 Feb 2023 09:02:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fm/LincolnMMS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/FreundM99,
  author       = {Stephen N. Freund and
                  John C. Mitchell},
  editor       = {Brent Hailpern and
                  Linda M. Northrop and
                  A. Michael Berman},
  title        = {A Formal Framework for the Java Bytecode Language and Verifier},
  booktitle    = {Proceedings of the 1999 {ACM} {SIGPLAN} Conference on Object-Oriented
                  Programming Systems, Languages {\&} Applications, {OOPSLA} 1999,
                  Denver, Colorado, USA, November 1-5, 1999},
  pages        = {147--166},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/320384.320397},
  doi          = {10.1145/320384.320397},
  timestamp    = {Wed, 30 Mar 2022 13:58:42 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/FreundM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BonoMPS99,
  author       = {Viviana Bono and
                  John C. Mitchell and
                  Amit Patel and
                  Vitaly Shmatikov},
  editor       = {Stephen D. Brookes and
                  Achim Jung and
                  Michael W. Mislove and
                  Andre Scedrov},
  title        = {A Core Calculus of Classes and Objects},
  booktitle    = {Fifteenth Conference on Mathematical Foundations of Progamming Semantics,
                  {MFPS} 1999, Tulane University, New Orleans, LA, USA, April 28 - May
                  1, 1999},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {20},
  pages        = {28--49},
  publisher    = {Elsevier},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1571-0661(04)80065-3},
  doi          = {10.1016/S1571-0661(04)80065-3},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BonoMPS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tapos/FisherM98,
  author       = {Kathleen Fisher and
                  John C. Mitchell},
  title        = {On the Relationship Between Classes, Objects, and Data Abstraction},
  journal      = {Theory Pract. Object Syst.},
  volume       = {4},
  number       = {1},
  pages        = {3--25},
  year         = {1998},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tapos/FisherM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/Mitchell98,
  author       = {John C. Mitchell},
  editor       = {Alan J. Hu and
                  Moshe Y. Vardi},
  title        = {Finite-State Analysis of Security Protocols},
  booktitle    = {Computer Aided Verification, 10th International Conference, {CAV}
                  '98, Vancouver, BC, Canada, June 28 - July 2, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1427},
  pages        = {71--76},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0028734},
  doi          = {10.1007/BFB0028734},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/Mitchell98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LincolnMMS98,
  author       = {Patrick Lincoln and
                  John C. Mitchell and
                  Mark Mitchell and
                  Andre Scedrov},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {A Probabilistic Poly-Time Framework for Protocol Analysis},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {112--121},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288117},
  doi          = {10.1145/288090.288117},
  timestamp    = {Tue, 10 Nov 2020 20:00:11 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LincolnMMS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/MitchellMS98,
  author       = {John C. Mitchell and
                  Mark Mitchell and
                  Andre Scedrov},
  title        = {A Linguistic Characterization of Bounded Oracle Computation and Probabilistic
                  Polynomial Time},
  booktitle    = {39th Annual Symposium on Foundations of Computer Science, {FOCS} '98,
                  November 8-11, 1998, Palo Alto, California, {USA}},
  pages        = {725--733},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/SFCS.1998.743523},
  doi          = {10.1109/SFCS.1998.743523},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/MitchellMS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/FreundM98,
  author       = {Stephen N. Freund and
                  John C. Mitchell},
  editor       = {Bj{\o}rn N. Freeman{-}Benson and
                  Craig Chambers},
  title        = {A Type System for Object Initialization in the Java Bytecode Language},
  booktitle    = {Proceedings of the 1998 {ACM} {SIGPLAN} Conference on Object-Oriented
                  Programming Systems, Languages {\&} Applications, {OOPSLA} 1998,
                  Vancouver, British Columbia, Canada, October 18-22, 1998},
  pages        = {310--327},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/286936.286972},
  doi          = {10.1145/286936.286972},
  timestamp    = {Wed, 30 Mar 2022 13:58:30 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/FreundM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MitchellSS98,
  author       = {John C. Mitchell and
                  Vitaly Shmatikov and
                  Ulrich Stern},
  editor       = {Aviel D. Rubin},
  title        = {Finite-State Analysis of {SSL} 3.0},
  booktitle    = {Proceedings of the 7th {USENIX} Security Symposium, San Antonio, TX,
                  USA, January 26-29, 1998},
  publisher    = {{USENIX} Association},
  year         = {1998},
  url          = {https://www.usenix.org/conference/7th-usenix-security-symposium/finite-state-analysis-ssl-30},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MitchellSS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/MitchellR97,
  author       = {John C. Mitchell and
                  Jon G. Riecke},
  title        = {The analysis of programming structure},
  journal      = {{SIGACT} News},
  volume       = {28},
  number       = {2},
  pages        = {24--31},
  year         = {1997},
  url          = {https://doi.org/10.1145/261342.262782},
  doi          = {10.1145/261342.262782},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigact/MitchellR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigplan/HarperM97,
  author       = {Robert Harper and
                  John C. Mitchell},
  title        = {{ML} and Beyond},
  journal      = {{ACM} {SIGPLAN} Notices},
  volume       = {32},
  number       = {1},
  pages        = {80--85},
  year         = {1997},
  url          = {https://doi.org/10.1145/251595.251603},
  doi          = {10.1145/251595.251603},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigplan/HarperM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/AgesenFM97,
  author       = {Ole Agesen and
                  Stephen N. Freund and
                  John C. Mitchell},
  editor       = {Mary E. S. Loomis and
                  Toby Bloom and
                  A. Michael Berman},
  title        = {Adding Type Parameterization to the Java Language},
  booktitle    = {Proceedings of the 1997 {ACM} {SIGPLAN} Conference on Object-Oriented
                  Programming Systems, Languages {\&} Applications, {OOPSLA} 1997,
                  Atlanta, Georgia, October 5-9, 1997},
  pages        = {49--65},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/263698.263720},
  doi          = {10.1145/263698.263720},
  timestamp    = {Wed, 30 Mar 2022 13:58:18 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/AgesenFM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MitchellMS97,
  author       = {John C. Mitchell and
                  Mark Mitchell and
                  Ulrich Stern},
  title        = {Automated analysis of cryptographic protocols using Mur-phi},
  booktitle    = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland,
                  CA, {USA}},
  pages        = {141--151},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SECPRI.1997.601329},
  doi          = {10.1109/SECPRI.1997.601329},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MitchellMS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/FreundM97,
  author       = {Stephen N. Freund and
                  John C. Mitchell},
  editor       = {Andrew D. Gordon and
                  Andrew M. Pitts and
                  Carolyn L. Talcott},
  title        = {A Type System For Object Initialization In the Java Bytecode Language},
  booktitle    = {Second Workshop on Higher-Order Operational Techniques in Semantics,
                  {HOOTS} 1997, Stanford, CA, USA, December 8-12, 1997},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {10},
  pages        = {242--245},
  publisher    = {Elsevier},
  year         = {1997},
  url          = {https://doi.org/10.1016/S1571-0661(05)80703-0},
  doi          = {10.1016/S1571-0661(05)80703-0},
  timestamp    = {Fri, 11 Nov 2022 13:29:29 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/FreundM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0085577,
  author       = {John C. Mitchell},
  title        = {Foundations for programming languages},
  series       = {Foundation of computing series},
  publisher    = {{MIT} Press},
  year         = {1996},
  isbn         = {978-0-262-13321-0},
  timestamp    = {Wed, 27 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0085577.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bsl/LincolnMS96,
  author       = {Patrick Lincoln and
                  John C. Mitchell and
                  Andre Scedrov},
  title        = {Linear logic proof games and optimization},
  journal      = {Bull. Symb. Log.},
  volume       = {2},
  number       = {3},
  pages        = {322--338},
  year         = {1996},
  url          = {https://doi.org/10.2307/420993},
  doi          = {10.2307/420993},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bsl/LincolnMS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/HarperM96,
  author       = {Robert Harper and
                  John C. Mitchell},
  title        = {{ML} and Beyond},
  journal      = {{ACM} Comput. Surv.},
  volume       = {28},
  number       = {4es},
  pages        = {219},
  year         = {1996},
  url          = {https://doi.org/10.1145/242224.242438},
  doi          = {10.1145/242224.242438},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/HarperM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/GunterMN96,
  author       = {Carl A. Gunter and
                  John C. Mitchell and
                  David Notkin},
  title        = {Strategic Directions in Software Engineering and Programming Languages},
  journal      = {{ACM} Comput. Surv.},
  volume       = {28},
  number       = {4},
  pages        = {727--737},
  year         = {1996},
  url          = {https://doi.org/10.1145/242223.242283},
  doi          = {10.1145/242223.242283},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/GunterMN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Viswanathan96,
  author       = {John C. Mitchell and
                  Ramesh Viswanathan},
  title        = {Standard {ML-NJ} Weak Polymorphism and Imperative Constructs},
  journal      = {Inf. Comput.},
  volume       = {127},
  number       = {2},
  pages        = {102--116},
  year         = {1996},
  url          = {https://doi.org/10.1006/inco.1996.0054},
  doi          = {10.1006/INCO.1996.0054},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/Viswanathan96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/MitchellV96,
  author       = {John C. Mitchell and
                  Ramesh Viswanathan},
  editor       = {Friedhelm Meyer auf der Heide and
                  Burkhard Monien},
  title        = {Effective Models of Polymorphism, Subtyping and Recursion (Extended
                  Abstract)},
  booktitle    = {Automata, Languages and Programming, 23rd International Colloquium,
                  ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1099},
  pages        = {170--181},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61440-0\_126},
  doi          = {10.1007/3-540-61440-0\_126},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/MitchellV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/LincolnMS96,
  author       = {Patrick Lincoln and
                  John C. Mitchell and
                  Andre Scedrov},
  editor       = {Jean{-}Yves Girard and
                  Mitsuhiro Okada and
                  Andre Scedrov},
  title        = {The Complexity of Local Proof Search in Linear Logic},
  booktitle    = {Linear Logic Tokyo Meeting 1996, Keio University, Mita Campus, Tokyo,
                  Japan, March 29 - April 2, 1996},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {3},
  pages        = {120--129},
  publisher    = {Elsevier},
  year         = {1996},
  url          = {https://doi.org/10.1016/S1571-0661(05)80410-4},
  doi          = {10.1016/S1571-0661(05)80410-4},
  timestamp    = {Fri, 11 Nov 2022 13:19:20 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/LincolnMS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tapos/FisherM95,
  author       = {Kathleen Fisher and
                  John C. Mitchell},
  title        = {The Development of Type Systems for Object-Oriented Languages},
  journal      = {Theory Pract. Object Syst.},
  volume       = {1},
  number       = {3},
  pages        = {189--220},
  year         = {1995},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tapos/FisherM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fct/FisherM95,
  author       = {Kathleen Fisher and
                  John C. Mitchell},
  editor       = {Horst Reichel},
  title        = {A Delegation-based Object Calculus with Subtying},
  booktitle    = {Fundamentals of Computation Theory, 10th International Symposium,
                  {FCT} '95, Dresden, Germany, August 22-25, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {965},
  pages        = {42--61},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60249-6\_40},
  doi          = {10.1007/3-540-60249-6\_40},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fct/FisherM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/HoangM95,
  author       = {My Hoang and
                  John C. Mitchell},
  editor       = {Ron K. Cytron and
                  Peter Lee},
  title        = {Lower Bounds on Type Inference with Subtypes},
  booktitle    = {Conference Record of POPL'95: 22nd {ACM} {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, San Francisco, California,
                  USA, January 23-25, 1995},
  pages        = {176--185},
  publisher    = {{ACM} Press},
  year         = {1995},
  url          = {https://doi.org/10.1145/199448.199481},
  doi          = {10.1145/199448.199481},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/HoangM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/CardelliMMS94,
  author       = {Luca Cardelli and
                  Simone Martini and
                  John C. Mitchell and
                  Andre Scedrov},
  title        = {An Extension of System {F} with Subtyping},
  journal      = {Inf. Comput.},
  volume       = {109},
  number       = {1/2},
  pages        = {4--56},
  year         = {1994},
  url          = {https://doi.org/10.1006/inco.1994.1013},
  doi          = {10.1006/INCO.1994.1013},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/CardelliMMS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/njc/FisherHM94,
  author       = {Kathleen Fisher and
                  Furio Honsell and
                  John C. Mitchell},
  title        = {A lambda Calculus of Objects and Method Specialization},
  journal      = {Nord. J. Comput.},
  volume       = {1},
  number       = {1},
  pages        = {3--37},
  year         = {1994},
  timestamp    = {Wed, 14 Jan 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/njc/FisherHM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idl/KatiyarLM94,
  author       = {Dinesh Katiyar and
                  David C. Luckham and
                  John C. Mitchell},
  editor       = {Jeannette M. Wing and
                  Richard L. Wexelblat},
  title        = {Polymorphism and Subtyping in Interfaces},
  booktitle    = {Proceedings of the Workshop on Interface Definition Languages, January
                  20, 1994, Portland, Oregon, USA, in conjunction with {POPL} 1994},
  pages        = {22--34},
  publisher    = {{ACM} Press},
  year         = {1994},
  url          = {https://doi.org/10.1145/185084.185098},
  doi          = {10.1145/185084.185098},
  timestamp    = {Fri, 09 Jul 2021 14:03:46 +0200},
  biburl       = {https://dblp.org/rec/conf/idl/KatiyarLM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/KatiyarLM94,
  author       = {Dinesh Katiyar and
                  David C. Luckham and
                  John C. Mitchell},
  editor       = {Hans{-}Juergen Boehm and
                  Bernard Lang and
                  Daniel M. Yellin},
  title        = {A Type System for Prototyping Languages},
  booktitle    = {Conference Record of POPL'94: 21st {ACM} {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, Portland, Oregon, USA, January
                  17-21, 1994},
  pages        = {138--150},
  publisher    = {{ACM} Press},
  year         = {1994},
  url          = {https://doi.org/10.1145/174675.177838},
  doi          = {10.1145/174675.177838},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/KatiyarLM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacs/FisherM94,
  author       = {Kathleen Fisher and
                  John C. Mitchell},
  editor       = {Masami Hagiya and
                  John C. Mitchell},
  title        = {Notes on Typed Object-Oriented Programming},
  booktitle    = {Theoretical Aspects of Computer Software, International Conference
                  {TACS} '94, Sendai, Japan, April 19-22, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {789},
  pages        = {844--885},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-57887-0\_128},
  doi          = {10.1007/3-540-57887-0\_128},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/tacs/FisherM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tacs/1994,
  editor       = {Masami Hagiya and
                  John C. Mitchell},
  title        = {Theoretical Aspects of Computer Software, International Conference
                  {TACS} '94, Sendai, Japan, April 19-22, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {789},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-57887-0},
  doi          = {10.1007/3-540-57887-0},
  isbn         = {3-540-57887-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tacs/1994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/JategaonkarM93,
  author       = {Lalita Jategaonkar and
                  John C. Mitchell},
  title        = {Type Inference with Extended Pattern Matching and Subtypes},
  journal      = {Fundam. Informaticae},
  volume       = {19},
  number       = {1/2},
  pages        = {127--165},
  year         = {1993},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/JategaonkarM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/Mitchell93,
  author       = {John C. Mitchell},
  title        = {On Abstraction and the Expressive Power of Programming Languages},
  journal      = {Sci. Comput. Program.},
  volume       = {21},
  number       = {2},
  pages        = {141--163},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-6423(93)90004-9},
  doi          = {10.1016/0167-6423(93)90004-9},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/Mitchell93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/HarperM93,
  author       = {Robert Harper and
                  John C. Mitchell},
  title        = {On the Type Structure of Standard {ML}},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {15},
  number       = {2},
  pages        = {211--252},
  year         = {1993},
  url          = {https://doi.org/10.1145/169701.169696},
  doi          = {10.1145/169701.169696},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/HarperM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/HoangMV93,
  author       = {My Hoang and
                  John C. Mitchell and
                  Ramesh Viswanathan},
  title        = {Standard {ML-NJ} weak polymorphism and imperative constructs},
  booktitle    = {Proceedings of the Eighth Annual Symposium on Logic in Computer Science
                  {(LICS} '93), Montreal, Canada, June 19-23, 1993},
  pages        = {15--25},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/LICS.1993.287604},
  doi          = {10.1109/LICS.1993.287604},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/HoangMV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/MitchellHF93,
  author       = {John C. Mitchell and
                  Furio Honsell and
                  Kathleen Fisher},
  title        = {A lambda calculus of objects and method specialization},
  booktitle    = {Proceedings of the Eighth Annual Symposium on Logic in Computer Science
                  {(LICS} '93), Montreal, Canada, June 19-23, 1993},
  pages        = {26--38},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/LICS.1993.287603},
  doi          = {10.1109/LICS.1993.287603},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/MitchellHF93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apal/LincolnMSS92,
  author       = {Patrick Lincoln and
                  John C. Mitchell and
                  Andre Scedrov and
                  Natarajan Shankar},
  title        = {Decision Problems for Propositional Linear Logic},
  journal      = {Ann. Pure Appl. Log.},
  volume       = {56},
  number       = {1-3},
  pages        = {239--311},
  year         = {1992},
  url          = {https://doi.org/10.1016/0168-0072(92)90075-B},
  doi          = {10.1016/0168-0072(92)90075-B},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apal/LincolnMSS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/MitchellS92,
  author       = {John C. Mitchell and
                  Andre Scedrov},
  editor       = {Egon B{\"{o}}rger and
                  Gerhard J{\"{a}}ger and
                  Hans Kleine B{\"{u}}ning and
                  Simone Martini and
                  Michael M. Richter},
  title        = {Notes on Sconing and Relators},
  booktitle    = {Computer Science Logic, 6th Workshop, {CSL} '92, San Miniato, Italy,
                  September 28 - October 2, 1992, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {702},
  pages        = {352--378},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-56992-8\_21},
  doi          = {10.1007/3-540-56992-8\_21},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/MitchellS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/LincolnM92,
  author       = {Patrick Lincoln and
                  John C. Mitchell},
  title        = {Operational aspects of linear lambda calculus},
  booktitle    = {Proceedings of the Seventh Annual Symposium on Logic in Computer Science
                  {(LICS} '92), Santa Cruz, California, USA, June 22-25, 1992},
  pages        = {235--246},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/LICS.1992.185536},
  doi          = {10.1109/LICS.1992.185536},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/LincolnM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/LincolnM92,
  author       = {Patrick Lincoln and
                  John C. Mitchell},
  editor       = {Ravi Sethi},
  title        = {Algorithmic Aspects of Type Inference with Subtypes},
  booktitle    = {Conference Record of the Nineteenth Annual {ACM} {SIGPLAN-SIGACT}
                  Symposium on Principles of Programming Languages, Albuquerque, New
                  Mexico, USA, January 19-22, 1992},
  pages        = {293--304},
  publisher    = {{ACM} Press},
  year         = {1992},
  url          = {https://doi.org/10.1145/143165.143227},
  doi          = {10.1145/143165.143227},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/LincolnM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/BruceM92,
  author       = {Kim B. Bruce and
                  John C. Mitchell},
  editor       = {Ravi Sethi},
  title        = {{PER} Models of Subtyping, Recursive Types and Higher-Order Polymorphism},
  booktitle    = {Conference Record of the Nineteenth Annual {ACM} {SIGPLAN-SIGACT}
                  Symposium on Principles of Programming Languages, Albuquerque, New
                  Mexico, USA, January 19-22, 1992},
  pages        = {316--327},
  publisher    = {{ACM} Press},
  year         = {1992},
  url          = {https://doi.org/10.1145/143165.143230},
  doi          = {10.1145/143165.143230},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/BruceM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apal/MitchellM91,
  author       = {John C. Mitchell and
                  Eugenio Moggi},
  title        = {Kripke-Style Models for Typed lambda Calculus},
  journal      = {Ann. Pure Appl. Log.},
  volume       = {51},
  number       = {1-2},
  pages        = {99--124},
  year         = {1991},
  url          = {https://doi.org/10.1016/0168-0072(91)90067-V},
  doi          = {10.1016/0168-0072(91)90067-V},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apal/MitchellM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/Mitchell91,
  author       = {John C. Mitchell},
  title        = {Type Inference With Simple Subtypes},
  journal      = {J. Funct. Program.},
  volume       = {1},
  number       = {3},
  pages        = {245--285},
  year         = {1991},
  url          = {https://doi.org/10.1017/S0956796800000113},
  doi          = {10.1017/S0956796800000113},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/Mitchell91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mscs/CardelliM91,
  author       = {Luca Cardelli and
                  John C. Mitchell},
  title        = {Operations on Records},
  journal      = {Math. Struct. Comput. Sci.},
  volume       = {1},
  number       = {1},
  pages        = {3--48},
  year         = {1991},
  url          = {https://doi.org/10.1017/S0960129500000049},
  doi          = {10.1017/S0960129500000049},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mscs/CardelliM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Mitchell91,
  author       = {John C. Mitchell},
  editor       = {Vladimir Lifschitz},
  title        = {On the Equivalence of Data Representations},
  booktitle    = {Artificial and Mathematical Theory of Computation, Papers in Honor
                  of John McCarthy on the occasion of his sixty-fourth birthday},
  pages        = {305--329},
  publisher    = {Academic Press / Elsevier},
  year         = {1991},
  url          = {https://doi.org/10.1016/b978-0-12-450010-5.50023-2},
  doi          = {10.1016/B978-0-12-450010-5.50023-2},
  timestamp    = {Wed, 26 Jun 2019 13:52:03 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Mitchell91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/KanellakisMM91,
  author       = {Paris C. Kanellakis and
                  Harry G. Mairson and
                  John C. Mitchell},
  editor       = {Jean{-}Louis Lassez and
                  Gordon D. Plotkin},
  title        = {Unification and ML-Type Reconstruction},
  booktitle    = {Computational Logic - Essays in Honor of Alan Robinson},
  pages        = {444--478},
  publisher    = {The {MIT} Press},
  year         = {1991},
  timestamp    = {Wed, 30 Mar 2016 17:34:58 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/KanellakisMM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/constructivity/KurtzMO91,
  author       = {Stuart A. Kurtz and
                  John C. Mitchell and
                  Michael J. O'Donnell},
  editor       = {J. Paul Myers Jr. and
                  Michael J. O'Donnell},
  title        = {Connecting Formal Semantics to Constructive Intuitions},
  booktitle    = {Constructivity in Computer Science, Summer Symposium, San Antonio,
                  Texas, USA, June 19-22, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {613},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/BFb0021079},
  doi          = {10.1007/BFB0021079},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/constructivity/KurtzMO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/MitchellMM91,
  author       = {John C. Mitchell and
                  Sigurd Meldal and
                  Neel Madhav},
  editor       = {David S. Wise},
  title        = {An Extension of Standard {ML} Modules with Subtyping and Inheritance},
  booktitle    = {Conference Record of the Eighteenth Annual {ACM} Symposium on Principles
                  of Programming Languages, Orlando, Florida, USA, January 21-23, 1991},
  pages        = {270--278},
  publisher    = {{ACM} Press},
  year         = {1991},
  url          = {https://doi.org/10.1145/99583.99620},
  doi          = {10.1145/99583.99620},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/MitchellMM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacs/Mitchell91,
  author       = {John C. Mitchell},
  editor       = {Takayasu Ito and
                  Albert R. Meyer},
  title        = {On Abstraction and the Expressive Power of Programming Languages},
  booktitle    = {Theoretical Aspects of Computer Software, International Conference
                  {TACS} '91, Sendai, Japan, September 24-27, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {526},
  pages        = {290--310},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54415-1\_51},
  doi          = {10.1007/3-540-54415-1\_51},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/tacs/Mitchell91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacs/CardelliMMS91,
  author       = {Luca Cardelli and
                  Simone Martini and
                  John C. Mitchell and
                  Andre Scedrov},
  editor       = {Takayasu Ito and
                  Albert R. Meyer},
  title        = {An Extension of System {F} with Subtyping},
  booktitle    = {Theoretical Aspects of Computer Software, International Conference
                  {TACS} '91, Sendai, Japan, September 24-27, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {526},
  pages        = {750--770},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54415-1\_73},
  doi          = {10.1007/3-540-54415-1\_73},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tacs/CardelliMMS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BruceMM90,
  author       = {Kim B. Bruce and
                  Albert R. Meyer and
                  John C. Mitchell},
  title        = {The Semantics of Second-Order Lambda Calculus},
  journal      = {Inf. Comput.},
  volume       = {85},
  number       = {1},
  pages        = {76--134},
  year         = {1990},
  url          = {https://doi.org/10.1016/0890-5401(90)90044-I},
  doi          = {10.1016/0890-5401(90)90044-I},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/BruceMM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/LincolnMSS90,
  author       = {Patrick Lincoln and
                  John C. Mitchell and
                  Andre Scedrov and
                  Natarajan Shankar},
  title        = {Decision Problems for Propositional Linear Logic},
  booktitle    = {31st Annual Symposium on Foundations of Computer Science, St. Louis,
                  Missouri, USA, October 22-24, 1990, Volume {II}},
  pages        = {662--671},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/FSCS.1990.89588},
  doi          = {10.1109/FSCS.1990.89588},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/LincolnMSS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lfp/HowardM90,
  author       = {Brian T. Howard and
                  John C. Mitchell},
  editor       = {Gilles Kahn},
  title        = {Operational and Axiomatic Semantics of {PCF}},
  booktitle    = {Proceedings of the 1990 {ACM} Conference on {LISP} and Functional
                  Programming, {LFP} 1990, Nice, France, 27-29 June 1990},
  pages        = {298--306},
  publisher    = {{ACM}},
  year         = {1990},
  url          = {https://doi.org/10.1145/91556.91677},
  doi          = {10.1145/91556.91677},
  timestamp    = {Fri, 06 Aug 2021 15:08:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lfp/HowardM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/Mitchell90,
  author       = {John C. Mitchell},
  editor       = {Frances E. Allen},
  title        = {Toward a Typed Foundation for Method Specialization and Inheritance},
  booktitle    = {Conference Record of the Seventeenth Annual {ACM} Symposium on Principles
                  of Programming Languages, San Francisco, California, USA, January
                  1990},
  pages        = {109--124},
  publisher    = {{ACM} Press},
  year         = {1990},
  url          = {https://doi.org/10.1145/96709.96719},
  doi          = {10.1145/96709.96719},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/Mitchell90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/HarperMM90,
  author       = {Robert Harper and
                  John C. Mitchell and
                  Eugenio Moggi},
  editor       = {Frances E. Allen},
  title        = {Higher-Order Modules and the Phase Distinction},
  booktitle    = {Conference Record of the Seventeenth Annual {ACM} Symposium on Principles
                  of Programming Languages, San Francisco, California, USA, January
                  1990},
  pages        = {341--354},
  publisher    = {{ACM} Press},
  year         = {1990},
  url          = {https://doi.org/10.1145/96709.96744},
  doi          = {10.1145/96709.96744},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/HarperMM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/leeuwen90/Mitchell90,
  author       = {John C. Mitchell},
  editor       = {Jan van Leeuwen},
  title        = {Type Systems for Programming Languages},
  booktitle    = {Handbook of Theoretical Computer Science, Volume {B:} Formal Models
                  and Semantics},
  pages        = {365--458},
  publisher    = {Elsevier and {MIT} Press},
  year         = {1990},
  url          = {https://doi.org/10.1016/b978-0-444-88074-1.50013-5},
  doi          = {10.1016/B978-0-444-88074-1.50013-5},
  timestamp    = {Tue, 06 Aug 2019 09:45:21 +0200},
  biburl       = {https://dblp.org/rec/books/el/leeuwen90/Mitchell90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctcs/CardelliM89,
  author       = {Luca Cardelli and
                  John C. Mitchell},
  editor       = {David H. Pitt and
                  David E. Rydeheard and
                  Peter Dybjer and
                  Andrew M. Pitts and
                  Axel Poign{\'{e}}},
  title        = {Operations in Records},
  booktitle    = {Category Theory and Computer Science, Manchester, UK, September 5-8,
                  1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {389},
  pages        = {75--81},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/BFb0018345},
  doi          = {10.1007/BFB0018345},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ctcs/CardelliM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpca/CanningCHOM89,
  author       = {Peter S. Canning and
                  William R. Cook and
                  Walter L. Hill and
                  Walter G. Olthoff and
                  John C. Mitchell},
  editor       = {Joseph E. Stoy},
  title        = {F-Bounded Polymorphism for Object-Oriented Programming},
  booktitle    = {Proceedings of the fourth international conference on Functional programming
                  languages and computer architecture, {FPCA} 1989, London, UK, September
                  11-13, 1989},
  pages        = {273--280},
  publisher    = {{ACM}},
  year         = {1989},
  url          = {https://doi.org/10.1145/99370.99392},
  doi          = {10.1145/99370.99392},
  timestamp    = {Tue, 06 Nov 2018 11:07:48 +0100},
  biburl       = {https://dblp.org/rec/conf/fpca/CanningCHOM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfps/CardelliM89,
  author       = {Luca Cardelli and
                  John C. Mitchell},
  editor       = {Michael G. Main and
                  Austin Melton and
                  Michael W. Mislove and
                  David A. Schmidt},
  title        = {Operations on Records},
  booktitle    = {Mathematical Foundations of Programming Semantics, 5th International
                  Conference, Tulane University, New Orleans, Louisiana, USA, March
                  29 - April 1, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {442},
  pages        = {22--52},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/BFb0040253},
  doi          = {10.1007/BFB0040253},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/mfps/CardelliM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/KanellakisM89,
  author       = {Paris C. Kanellakis and
                  John C. Mitchell},
  title        = {Polymorphic Unification and {ML} Typing},
  booktitle    = {Conference Record of the Sixteenth Annual {ACM} Symposium on Principles
                  of Programming Languages, Austin, Texas, USA, January 11-13, 1989},
  pages        = {105--115},
  publisher    = {{ACM} Press},
  year         = {1989},
  url          = {https://doi.org/10.1145/75277.75286},
  doi          = {10.1145/75277.75286},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/KanellakisM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Mitchell88,
  author       = {John C. Mitchell},
  title        = {Polymorphic Type Inference and Containment},
  journal      = {Inf. Comput.},
  volume       = {76},
  number       = {2/3},
  pages        = {211--249},
  year         = {1988},
  url          = {https://doi.org/10.1016/0890-5401(88)90009-0},
  doi          = {10.1016/0890-5401(88)90009-0},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/Mitchell88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/MitchellP88,
  author       = {John C. Mitchell and
                  Gordon D. Plotkin},
  title        = {Abstract Types Have Existential Type},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {10},
  number       = {3},
  pages        = {470--502},
  year         = {1988},
  url          = {https://doi.org/10.1145/44501.45065},
  doi          = {10.1145/44501.45065},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/MitchellP88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lfp/JategaonkarM88,
  author       = {Lalita Jategaonkar and
                  John C. Mitchell},
  editor       = {J{\'{e}}r{\^{o}}me Chailloux},
  title        = {{ML} with Extended Pattern Matching and Subtypes},
  booktitle    = {Proceedings of the 1988 {ACM} Conference on {LISP} and Functional
                  Programming, {LFP} 1988, Snowbird, Utah, USA, July 25-27, 1988},
  pages        = {198--211},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/62678.62702},
  doi          = {10.1145/62678.62702},
  timestamp    = {Fri, 06 Aug 2021 15:08:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lfp/JategaonkarM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/MitchellH88,
  author       = {John C. Mitchell and
                  Robert Harper},
  editor       = {Jeanne Ferrante and
                  Peter Mager},
  title        = {The Essence of {ML}},
  booktitle    = {Conference Record of the Fifteenth Annual {ACM} Symposium on Principles
                  of Programming Languages, San Diego, California, USA, January 10-13,
                  1988},
  pages        = {28--46},
  publisher    = {{ACM} Press},
  year         = {1988},
  url          = {https://doi.org/10.1145/73560.73563},
  doi          = {10.1145/73560.73563},
  timestamp    = {Thu, 16 Sep 2021 11:02:28 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/MitchellH88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/MitchellM87,
  author       = {John C. Mitchell and
                  Eugenio Moggi},
  title        = {Kripke-Style models for typed lambda calculus},
  booktitle    = {Proceedings of the Symposium on Logic in Computer Science {(LICS}
                  '87), Ithaca, New York, USA, June 22-25, 1987},
  pages        = {303--314},
  publisher    = {{IEEE} Computer Society},
  year         = {1987},
  timestamp    = {Thu, 22 Jan 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/MitchellM87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/MeyerMMS87,
  author       = {Albert R. Meyer and
                  John C. Mitchell and
                  Eugenio Moggi and
                  Richard Statman},
  title        = {Empty Types in Polymorphic Lambda Calculus},
  booktitle    = {Conference Record of the Fourteenth Annual {ACM} Symposium on Principles
                  of Programming Languages, Munich, Germany, January 21-23, 1987},
  pages        = {253--262},
  publisher    = {{ACM} Press},
  year         = {1987},
  url          = {https://doi.org/10.1145/41625.41648},
  doi          = {10.1145/41625.41648},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/MeyerMMS87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lfp/Mitchell86,
  author       = {John C. Mitchell},
  editor       = {William L. Scherlis and
                  John H. Williams and
                  Richard P. Gabriel},
  title        = {A Type-Inference Approach to Reduction Properties and Semantics of
                  Polymorphic Expressions (Summary)},
  booktitle    = {Proceedings of the 1986 {ACM} Conference on {LISP} and Functional
                  Programming, {LFP} 1986, Cambridge, Massachusetts, USA, August 4-6,
                  1986},
  pages        = {308--319},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/319838.319872},
  doi          = {10.1145/319838.319872},
  timestamp    = {Fri, 06 Aug 2021 15:08:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lfp/Mitchell86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/Mitchell86,
  author       = {John C. Mitchell},
  title        = {Representation Independence and Data Abstraction},
  booktitle    = {Conference Record of the Thirteenth Annual {ACM} Symposium on Principles
                  of Programming Languages, St. Petersburg Beach, Florida, USA, January
                  1986},
  pages        = {263--276},
  publisher    = {{ACM} Press},
  year         = {1986},
  url          = {https://doi.org/10.1145/512644.512669},
  doi          = {10.1145/512644.512669},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/Mitchell86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tark/MitchellO86,
  author       = {John C. Mitchell and
                  Michael J. O'Donnell},
  editor       = {Joseph Y. Halpern},
  title        = {Realisability Semantics for Error-Tolerant Logics},
  booktitle    = {Proceedings of the 1st Conference on Theoretical Aspects of Reasoning
                  about Knowledge, Monterey, CA, USA, March 1986},
  pages        = {363--382},
  publisher    = {Morgan Kaufmann},
  year         = {1986},
  timestamp    = {Thu, 21 Jun 2018 07:50:24 +0200},
  biburl       = {https://dblp.org/rec/conf/tark/MitchellO86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lop/MitchellM85,
  author       = {John C. Mitchell and
                  Albert R. Meyer},
  editor       = {Rohit Parikh},
  title        = {Second-Order Logical Relations (Extended Abstract)},
  booktitle    = {Logics of Programs, Conference, Brooklyn College, New York, NY, USA,
                  June 17-19, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {193},
  pages        = {225--236},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-15648-8\_18},
  doi          = {10.1007/3-540-15648-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/lop/MitchellM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/MitchellP85,
  author       = {John C. Mitchell and
                  Gordon D. Plotkin},
  editor       = {Mary S. Van Deusen and
                  Zvi Galil and
                  Brian K. Reid},
  title        = {Abstract Types Have Existential Type},
  booktitle    = {Conference Record of the Twelfth Annual {ACM} Symposium on Principles
                  of Programming Languages, New Orleans, Louisiana, USA, January 1985},
  pages        = {37--51},
  publisher    = {{ACM} Press},
  year         = {1985},
  url          = {https://doi.org/10.1145/318593.318606},
  doi          = {10.1145/318593.318606},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/MitchellP85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Mitchell84,
  author       = {John C. Mitchell},
  title        = {Lambda calculus models of typed programming languages},
  school       = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
  year         = {1984},
  url          = {https://hdl.handle.net/1721.1/15394},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ndltd/Mitchell84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/DworkKM84,
  author       = {Cynthia Dwork and
                  Paris C. Kanellakis and
                  John C. Mitchell},
  title        = {On the Sequential Nature of Unification},
  journal      = {J. Log. Program.},
  volume       = {1},
  number       = {1},
  pages        = {35--50},
  year         = {1984},
  url          = {https://doi.org/10.1016/0743-1066(84)90022-0},
  doi          = {10.1016/0743-1066(84)90022-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/DworkKM84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/Mitchell84,
  author       = {John C. Mitchell},
  title        = {Semantic Models for Second-Order Lambda Calculus},
  booktitle    = {25th Annual Symposium on Foundations of Computer Science, West Palm
                  Beach, Florida, USA, 24-26 October 1984},
  pages        = {289--299},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SFCS.1984.715927},
  doi          = {10.1109/SFCS.1984.715927},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/Mitchell84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/Mitchell84,
  author       = {John C. Mitchell},
  editor       = {Ken Kennedy and
                  Mary S. Van Deusen and
                  Larry Landweber},
  title        = {Coercion and Type Inference},
  booktitle    = {Conference Record of the Eleventh Annual {ACM} Symposium on Principles
                  of Programming Languages, Salt Lake City, Utah, USA, January 1984},
  pages        = {175--185},
  publisher    = {{ACM} Press},
  year         = {1984},
  url          = {https://doi.org/10.1145/800017.800529},
  doi          = {10.1145/800017.800529},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/Mitchell84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/MeyerM83,
  author       = {Albert R. Meyer and
                  John C. Mitchell},
  title        = {Termination Assertions for Recursive Programs: Completeness and Axiomatic
                  Definability},
  journal      = {Inf. Control.},
  volume       = {56},
  number       = {1/2},
  pages        = {112--138},
  year         = {1983},
  url          = {https://doi.org/10.1016/S0019-9958(83)80053-9},
  doi          = {10.1016/S0019-9958(83)80053-9},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/MeyerM83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Mitchell83,
  author       = {John C. Mitchell},
  title        = {The Implication Problem for Functional and Inclusion Dependencies},
  journal      = {Inf. Control.},
  volume       = {56},
  number       = {3},
  pages        = {154--173},
  year         = {1983},
  url          = {https://doi.org/10.1016/S0019-9958(83)80002-3},
  doi          = {10.1016/S0019-9958(83)80002-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/Mitchell83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pods/Mitchell83,
  author       = {John C. Mitchell},
  editor       = {Ronald Fagin and
                  Philip A. Bernstein},
  title        = {Inference Rules for Functional and Inclusion Dependencies},
  booktitle    = {Proceedings of the Second {ACM} {SIGACT-SIGMOD} Symposium on Principles
                  of Database Systems, March 21-23, 1983, Colony Square Hotel, Atlanta,
                  Georgia, {USA}},
  pages        = {58--69},
  publisher    = {{ACM}},
  year         = {1983},
  url          = {https://doi.org/10.1145/588058.588067},
  doi          = {10.1145/588058.588067},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pods/Mitchell83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/MeyerM82,
  author       = {Albert R. Meyer and
                  John C. Mitchell},
  editor       = {Richard A. DeMillo},
  title        = {Axiomatic Definability and Completeness for Recursive Programs},
  booktitle    = {Conference Record of the Ninth Annual {ACM} Symposium on Principles
                  of Programming Languages, Albuquerque, New Mexico, USA, January 1982},
  pages        = {337--346},
  publisher    = {{ACM} Press},
  year         = {1982},
  url          = {https://doi.org/10.1145/582153.582188},
  doi          = {10.1145/582153.582188},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/MeyerM82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics