Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: John C. Mitchell
@article{DBLP:journals/internet/KizilcecM24, author = {Ren{\'{e}} F. Kizilcec and John C. Mitchell}, title = {Remote Learning and Work}, journal = {{IEEE} Internet Comput.}, volume = {28}, number = {1}, pages = {7--9}, year = {2024}, url = {https://doi.org/10.1109/MIC.2023.3339941}, doi = {10.1109/MIC.2023.3339941}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/KizilcecM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/WangMP24, author = {Sierra Wang and John C. Mitchell and Chris Piech}, editor = {Ben Stephenson and Jeffrey A. Stone and Lina Battestilli and Samuel A. Rebelsky and Libby Shoop}, title = {A Large Scale {RCT} on Effective Error Messages in {CS1}}, booktitle = {Proceedings of the 55th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2024, Volume 1, Portland, OR, USA, March 20-23, 2024}, pages = {1395--1401}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3626252.3630764}, doi = {10.1145/3626252.3630764}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/WangMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/WangMHP24, author = {Sierra Wang and John C. Mitchell and Nick Haber and Chris Piech}, editor = {Ben Stephenson and Jeffrey A. Stone and Lina Battestilli and Samuel A. Rebelsky and Libby Shoop}, title = {Math {IDE:} {A} Platform for Creating with Math}, booktitle = {Proceedings of the 55th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2024, Volume 2, Portland, OR, USA, March 20-23, 2024}, pages = {1844--1845}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3626253.3635572}, doi = {10.1145/3626253.3635572}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/WangMHP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-04489, author = {Sanjari Srivastava and Piotr Mardziel and Zhikhun Zhang and Archana Ahlawat and Anupam Datta and John C. Mitchell}, title = {De-amplifying Bias from Differential Privacy in Language Model Fine-tuning}, journal = {CoRR}, volume = {abs/2402.04489}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.04489}, doi = {10.48550/ARXIV.2402.04489}, eprinttype = {arXiv}, eprint = {2402.04489}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-04489.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23, author = {Clark W. Barrett and Brad Boyd and Elie Bursztein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {Found. Trends Priv. Secur.}, volume = {6}, number = {1}, pages = {1--52}, year = {2023}, url = {https://doi.org/10.1561/3300000041}, doi = {10.1561/3300000041}, timestamp = {Sun, 24 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/CharitsisPM23, author = {Charis Charitsis and Chris Piech and John C. Mitchell}, editor = {Maureen Doyle and Ben Stephenson and Brian Dorn and Leen{-}Kiat Soh and Lina Battestilli}, title = {Detecting the Reasons for Program Decomposition in {CS1} and Evaluating Their Impact}, booktitle = {Proceedings of the 54th {ACM} Technical Symposium on Computer Science Education, Volume 1, {SIGCSE} 2023, Toronto, ON, Canada, March 15-18, 2023}, pages = {1014--1020}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3545945.3569763}, doi = {10.1145/3545945.3569763}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/CharitsisPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-14840, author = {Clark W. Barrett and Brad Boyd and Ellie Burzstein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {CoRR}, volume = {abs/2308.14840}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.14840}, doi = {10.48550/ARXIV.2308.14840}, eprinttype = {arXiv}, eprint = {2308.14840}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-14840.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-05174, author = {Nicholas Mosier and Hamed Nemati and John C. Mitchell and Caroline Trippel}, title = {Serberus: Protecting Cryptographic Code from Spectres at Compile-Time}, journal = {CoRR}, volume = {abs/2309.05174}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.05174}, doi = {10.48550/ARXIV.2309.05174}, eprinttype = {arXiv}, eprint = {2309.05174}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-05174.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lats/CharitsisPM22, author = {Charis Charitsis and Chris Piech and John C. Mitchell}, editor = {Ren{\'{e}} F. Kizilcec and Katie Davis and Xavier Ochoa}, title = {Function Names: Quantifying the Relationship Between Identifiers and Their Functionality to Improve Them}, booktitle = {L@S'22: Ninth {ACM} Conference on Learning @ Scale, New York City, NY, USA, June 1 - 3, 2022}, pages = {93--101}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3491140.3528269}, doi = {10.1145/3491140.3528269}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lats/CharitsisPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lats/CharitsisPM22a, author = {Charis Charitsis and Chris Piech and John C. Mitchell}, editor = {Ren{\'{e}} F. Kizilcec and Katie Davis and Xavier Ochoa}, title = {Using {NLP} to Quantify Program Decomposition in {CS1}}, booktitle = {L@S'22: Ninth {ACM} Conference on Learning @ Scale, New York City, NY, USA, June 1 - 3, 2022}, pages = {113--120}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3491140.3528272}, doi = {10.1145/3491140.3528272}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lats/CharitsisPM22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/CharitsisPM21, author = {Charis Charitsis and Chris Piech and John C. Mitchell}, editor = {Larry Merkle and Maureen Doyle and Judithe Sheard and Leen{-}Kiat Soh and Brian Dorn}, title = {Feedback on Program Development Process for {CS1} Students}, booktitle = {{SIGCSE} 2022: The 53rd {ACM} Technical Symposium on Computer Science Education, Providence, RI, USA, March 3-5, 2022, Volume 2}, pages = {1150}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3478432.3499062}, doi = {10.1145/3478432.3499062}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/CharitsisPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-09050, author = {Maxwell Bigman and Yosefa Gilon and Jenny Han and John C. Mitchell}, title = {Insights for post-pandemic pedagogy across one {CS} department}, journal = {CoRR}, volume = {abs/2203.09050}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.09050}, doi = {10.48550/ARXIV.2203.09050}, eprinttype = {arXiv}, eprint = {2203.09050}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-09050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-05181, author = {Sam Blackshear and John C. Mitchell and Todd Nowacki and Shaz Qadeer}, title = {The Move Borrow Checker}, journal = {CoRR}, volume = {abs/2205.05181}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.05181}, doi = {10.48550/ARXIV.2205.05181}, eprinttype = {arXiv}, eprint = {2205.05181}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-05181.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icetm/CharitsisPM21, author = {Charis Charitsis and Chris Piech and John C. Mitchell}, title = {Simplifying Automated Assessment in {CS1}}, booktitle = {{ICETM} 2021: 4th International Conference on Education Technology Management, Tokyo, Japan, December 17 - 19, 2021}, pages = {226--231}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3510309.3510345}, doi = {10.1145/3510309.3510345}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icetm/CharitsisPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lats/CharitsisPM21, author = {Charis Charitsis and Chris Piech and John C. Mitchell}, editor = {Christoph Meinel and Mar P{\'{e}}rez{-}Sanagust{\'{\i}}n and Marcus Specht and Amy Ogan}, title = {Assessing Function Names and Quantifying the Relationship Between Identifiers and Their Functionality to Improve Them}, booktitle = {L@S'21: Eighth {ACM} Conference on Learning @ Scale, Virtual Event, Germany, June 22-25, 2021}, pages = {291--294}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3430895.3460161}, doi = {10.1145/3430895.3460161}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lats/CharitsisPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/DiGiacomo-Castillo20, author = {Max DiGiacomo{-}Castillo and Yiyun Liang and Advay Pal and John C. Mitchell}, title = {Model Checking Bitcoin and other Proof-of-Work Consensus Protocols}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes, Greece, November 2-6, 2020}, pages = {351--358}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/Blockchain50366.2020.00051}, doi = {10.1109/BLOCKCHAIN50366.2020.00051}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/DiGiacomo-Castillo20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/BassenBSTPZGFM20, author = {Jonathan Bassen and Bharathan Balaji and Michael Schaarschmidt and Candace Thille and Jay Painter and Dawn Zimmaro and Alex Games and Ethan Fast and John C. Mitchell}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {Reinforcement Learning for the Adaptive Scheduling of Educational Activities}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--12}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376518}, doi = {10.1145/3313831.3376518}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/BassenBSTPZGFM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lwmoocs/BigmanM20, author = {Maxwell Bigman and John C. Mitchell}, title = {Teaching Online in 2020: Experiments, Empathy, Discovery}, booktitle = {{IEEE} Learning With MOOCS, {LWMOOCS} 2020, Antigua Guatemala, Guatemala, September 29 - October 2, 2020}, pages = {156--161}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/LWMOOCS50143.2020.9234318}, doi = {10.1109/LWMOOCS50143.2020.9234318}, timestamp = {Fri, 24 Sep 2021 09:47:55 +0200}, biburl = {https://dblp.org/rec/conf/lwmoocs/BigmanM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-05106, author = {Sam Blackshear and David L. Dill and Shaz Qadeer and Clark W. Barrett and John C. Mitchell and Oded Padon and Yoni Zohar}, title = {Resources: {A} Safe Language Abstraction for Money}, journal = {CoRR}, volume = {abs/2004.05106}, year = {2020}, url = {https://arxiv.org/abs/2004.05106}, eprinttype = {arXiv}, eprint = {2004.05106}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-05106.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-08644, author = {Max DiGiacomo{-}Castillo and Yiyun Liang and Advay Pal and John C. Mitchell}, title = {Model Checking Bitcoin and other Proof-of-Work Consensus Protocols}, journal = {CoRR}, volume = {abs/2007.08644}, year = {2020}, url = {https://arxiv.org/abs/2007.08644}, eprinttype = {arXiv}, eprint = {2007.08644}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-08644.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BartheFFMSS19, author = {Gilles Barthe and Edvard Fagerholm and Dario Fiore and John C. Mitchell and Andre Scedrov and Benedikt Schmidt}, title = {Automated Analysis of Cryptographic Assumptions in Generic Group Models}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {324--360}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9302-3}, doi = {10.1007/S00145-018-9302-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BartheFFMSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MandalMM018, author = {Avradip Mandal and John C. Mitchell and Hart Montgomery and Arnab Roy}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Giovanni Livraga and Ruben Rios}, title = {Data Oblivious Genome Variants Search on Intel {SGX}}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2018 International Workshops, {DPM} 2018 and {CBT} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11025}, pages = {296--310}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00305-0\_21}, doi = {10.1007/978-3-030-00305-0\_21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MandalMM018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lats/BassenHFMT18, author = {Jonathan Bassen and Iris Howley and Ethan Fast and John C. Mitchell and Candace Thille}, editor = {Rose Luckin and Scott R. Klemmer and Kenneth R. Koedinger}, title = {{OARS:} exploring instructor analytics for online learning}, booktitle = {Proceedings of the Fifth Annual {ACM} Conference on Learning at Scale, London, UK, June 26-28, 2018}, pages = {55:1--55:10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3231644.3231669}, doi = {10.1145/3231644.3231669}, timestamp = {Sat, 11 Sep 2021 23:19:16 +0200}, biburl = {https://dblp.org/rec/conf/lats/BassenHFMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TheodorakisM18, author = {Eftychios Theodorakis and John C. Mitchell}, title = {Semantic Security Invariance under Variant Computational Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2018}, url = {http://eprint.iacr.org/2018/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TheodorakisM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MandalMMR18, author = {Avradip Mandal and John C. Mitchell and Hart Montgomery and Arnab Roy}, title = {Data Oblivious Genome Variants Search on Intel {SGX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {732}, year = {2018}, url = {https://eprint.iacr.org/2018/732}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MandalMMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GiffinLSTMMR17, author = {Daniel B. Giffin and Amit Levy and Deian Stefan and David Terei and David Mazi{\`{e}}res and John C. Mitchell and Alejandro Russo}, title = {Hails: Protecting data privacy in untrusted web applications}, journal = {J. Comput. Secur.}, volume = {25}, number = {4-5}, pages = {427--461}, year = {2017}, url = {https://doi.org/10.3233/JCS-15801}, doi = {10.3233/JCS-15801}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GiffinLSTMMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/StefanMMR17, author = {Deian Stefan and David Mazi{\`{e}}res and John C. Mitchell and Alejandro Russo}, title = {Flexible dynamic information flow control in the presence of exceptions}, journal = {J. Funct. Program.}, volume = {27}, pages = {e5}, year = {2017}, url = {https://doi.org/10.1017/S0956796816000241}, doi = {10.1017/S0956796816000241}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/StefanMMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MandalMM017, author = {Avradip Mandal and John C. Mitchell and Hart William Montgomery and Arnab Roy}, title = {Privacy for targeted advertising}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {438--443}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228673}, doi = {10.1109/CNS.2017.8228673}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MandalMM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MandalMMR17, author = {Avradip Mandal and John C. Mitchell and Hart William Montgomery and Arnab Roy}, title = {Privacy for Targeted Advertising}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2017}, url = {http://eprint.iacr.org/2017/658}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MandalMMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pnas/MayerMM16, author = {Jonathan R. Mayer and Patrick Mutchler and John C. Mitchell}, title = {Evaluating the privacy properties of telephone metadata}, journal = {Proc. Natl. Acad. Sci. {USA}}, volume = {113}, number = {20}, pages = {5536--5541}, year = {2016}, url = {https://doi.org/10.1073/pnas.1508081113}, doi = {10.1073/PNAS.1508081113}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pnas/MayerMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WuZPM16, author = {David J. Wu and Joe Zimmerman and J{\'{e}}r{\'{e}}my Planul and John C. Mitchell}, title = {Privacy-Preserving Shortest Path Computation}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/privacy-preserving-shortest-path-computation.pdf}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/WuZPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MutchlerSDM16, author = {Patrick Mutchler and Yeganeh Safaei and Adam Doup{\'{e}} and John C. Mitchell}, title = {Target Fragmentation in Android Apps}, booktitle = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {204--213}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SPW.2016.31}, doi = {10.1109/SPW.2016.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MutchlerSDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/PaskovMH15, author = {Hristo S. Paskov and John C. Mitchell and Trevor J. Hastie}, editor = {Yoshua Bengio and Yann LeCun}, title = {Data Representation and Compression Using Linear-Programming Approximations}, booktitle = {4th International Conference on Learning Representations, {ICLR} 2016, San Juan, Puerto Rico, May 2-4, 2016, Conference Track Proceedings}, year = {2016}, url = {http://arxiv.org/abs/1511.06606}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PaskovMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuZPM16, author = {David J. Wu and Joe Zimmerman and J{\'{e}}r{\'{e}}my Planul and John C. Mitchell}, title = {Privacy-Preserving Shortest Path Computation}, journal = {CoRR}, volume = {abs/1601.02281}, year = {2016}, url = {http://arxiv.org/abs/1601.02281}, eprinttype = {arXiv}, eprint = {1601.02281}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuZPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/HeuleSYMR15, author = {Stefan Heule and Deian Stefan and Edward Z. Yang and John C. Mitchell and Alejandro Russo}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {{IFC} Inside: Retrofitting Languages with Dynamic Information Flow Control}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {11--31}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_2}, doi = {10.1007/978-3-662-46666-7\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/HeuleSYMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uai/PaskovMH15, author = {Hristo S. Paskov and John C. Mitchell and Trevor J. Hastie}, editor = {Marina Meila and Tom Heskes}, title = {Fast Algorithms for Learning with Long N-grams via Suffix Tree Based Matrix Multiplication}, booktitle = {Proceedings of the Thirty-First Conference on Uncertainty in Artificial Intelligence, {UAI} 2015, July 12-16, 2015, Amsterdam, The Netherlands}, pages = {672--681}, publisher = {{AUAI} Press}, year = {2015}, url = {http://auai.org/uai2015/proceedings/papers/285.pdf}, timestamp = {Thu, 12 Mar 2020 11:31:09 +0100}, biburl = {https://dblp.org/rec/conf/uai/PaskovMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HeuleSYMR15, author = {Stefan Heule and Deian Stefan and Edward Z. Yang and John C. Mitchell and Alejandro Russo}, title = {{IFC} Inside: Retrofitting Languages with Dynamic Information Flow Control (Extended Version)}, journal = {CoRR}, volume = {abs/1501.04132}, year = {2015}, url = {http://arxiv.org/abs/1501.04132}, eprinttype = {arXiv}, eprint = {1501.04132}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HeuleSYMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DattaHM0S15, author = {Anupam Datta and Joseph Y. Halpern and John C. Mitchell and Arnab Roy and Shayak Sen}, title = {A Symbolic Logic with Concrete Bounds for Cryptographic Protocols}, journal = {CoRR}, volume = {abs/1511.07536}, year = {2015}, url = {http://arxiv.org/abs/1511.07536}, eprinttype = {arXiv}, eprint = {1511.07536}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DattaHM0S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-manifestos/DillenbourgFKMW14, author = {Pierre Dillenbourg and Armando Fox and Claude Kirchner and John C. Mitchell and Martin Wirsing}, title = {Massive Open Online Courses: Current State and Perspectives (Dagstuhl Perspectives Workshop 14112)}, journal = {Dagstuhl Manifestos}, volume = {4}, number = {1}, pages = {1--27}, year = {2014}, url = {https://doi.org/10.4230/DagMan.4.1.1}, doi = {10.4230/DAGMAN.4.1.1}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-manifestos/DillenbourgFKMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ubiquity/Mitchell14, author = {John C. Mitchell}, title = {MOOCs on and off the Farm: MOOCs and technology to advance learning and learning research (Ubiquity symposium)}, journal = {Ubiquity}, volume = {2014}, number = {June}, pages = {1:1--1:10}, year = {2014}, url = {https://doi.org/10.1145/2591679}, doi = {10.1145/2591679}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ubiquity/Mitchell14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aistats/PaskovMH14, author = {Hristo S. Paskov and John C. Mitchell and Trevor J. Hastie}, title = {An Efficient Algorithm for Large Scale Compressive Feature Learning}, booktitle = {Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics, {AISTATS} 2014, Reykjavik, Iceland, April 22-25, 2014}, series = {{JMLR} Workshop and Conference Proceedings}, volume = {33}, pages = {760--768}, publisher = {JMLR.org}, year = {2014}, url = {http://proceedings.mlr.press/v33/paskov14.html}, timestamp = {Wed, 29 May 2019 08:41:44 +0200}, biburl = {https://dblp.org/rec/conf/aistats/PaskovMH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/BurszteinMFBMJ14, author = {Elie Bursztein and Angelique Moscicki and Celine Fabry and Steven Bethard and John C. Mitchell and Dan Jurafsky}, editor = {Matt Jones and Philippe A. Palanque and Albrecht Schmidt and Tovi Grossman}, title = {Easy does it: more usable CAPTCHAs}, booktitle = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014}, pages = {2637--2646}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556288.2557322}, doi = {10.1145/2556288.2557322}, timestamp = {Tue, 01 Jun 2021 15:21:43 +0200}, biburl = {https://dblp.org/rec/conf/chi/BurszteinMFBMJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartheFFMSS14, author = {Gilles Barthe and Edvard Fagerholm and Dario Fiore and John C. Mitchell and Andre Scedrov and Benedikt Schmidt}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Automated Analysis of Cryptographic Assumptions in Generic Group Models}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {95--112}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_6}, doi = {10.1007/978-3-662-44371-2\_6}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BartheFFMSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/MitchellZ14, author = {John C. Mitchell and Joe Zimmerman}, editor = {Ernst W. Mayr and Natacha Portier}, title = {Data-Oblivious Data Structures}, booktitle = {31st International Symposium on Theoretical Aspects of Computer Science {(STACS} 2014), {STACS} 2014, March 5-8, 2014, Lyon, France}, series = {LIPIcs}, volume = {25}, pages = {554--565}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2014}, url = {https://doi.org/10.4230/LIPIcs.STACS.2014.554}, doi = {10.4230/LIPICS.STACS.2014.554}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/stacs/MitchellZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/BurszteinAMM14, author = {Elie Bursztein and Jonathan Aigrain and Angelika Moscicki and John C. Mitchell}, editor = {Sergey Bratus and Felix "FX" Lindner}, title = {The End is Nigh: Generic Solving of Text-based CAPTCHAs}, booktitle = {8th {USENIX} Workshop on Offensive Technologies, {WOOT} '14, San Diego, CA, USA, August 19, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/woot14/workshop-program/presentation/bursztein}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/woot/BurszteinAMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/DillenbourgKMW14, author = {Pierre Dillenbourg and Claude Kirchner and John C. Mitchell and Martin Wirsing}, title = {Massively Open Online Courses, Current State and Perspectives (Dagstuhl Perspectives Workshop 14112)}, journal = {Dagstuhl Reports}, volume = {4}, number = {3}, pages = {47--61}, year = {2014}, url = {https://doi.org/10.4230/DagRep.4.3.47}, doi = {10.4230/DAGREP.4.3.47}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/DillenbourgKMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheFFMSS14, author = {Gilles Barthe and Edvard Fagerholm and Dario Fiore and John C. Mitchell and Andre Scedrov and Benedikt Schmidt}, title = {Automated Analysis of Cryptographic Assumptions in Generic Group Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2014}, url = {http://eprint.iacr.org/2014/458}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheFFMSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/PlanulM13, author = {J{\'{e}}r{\'{e}}my Planul and John C. Mitchell}, title = {Oblivious Program Execution and Path-Sensitive Non-interference}, booktitle = {2013 {IEEE} 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013}, pages = {66--80}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSF.2013.12}, doi = {10.1109/CSF.2013.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/PlanulM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/YangSMMMK13, author = {Edward Z. Yang and Deian Stefan and John C. Mitchell and David Mazi{\`{e}}res and Petr Marchenko and Brad Karp}, editor = {Petros Maniatis}, title = {Toward Principled Browser Security}, booktitle = {14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa Ana Pueblo, New Mexico, USA, May 13-15, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/hotos13/session/yang}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/hotos/YangSMMMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/Paskov0MH13, author = {Hristo S. Paskov and Robert West and John C. Mitchell and Trevor J. Hastie}, editor = {Christopher J. C. Burges and L{\'{e}}on Bottou and Zoubin Ghahramani and Kilian Q. Weinberger}, title = {Compressive Feature Learning}, booktitle = {Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013, Lake Tahoe, Nevada, United States}, pages = {2931--2939}, year = {2013}, url = {https://proceedings.neurips.cc/paper/2013/hash/5e1b18c4c6a6d31695acbae3fd70ecc6-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/Paskov0MH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChanLM13, author = {Ellick Chan and Peifung E. Lam and John C. Mitchell}, editor = {Kevin Fu and Darren Lacey and Zachary N. J. Peterson}, title = {Understanding the Challenges with Medical Data Segmentation for Privacy}, booktitle = {2013 {USENIX} Workshop on Health Information Technologies, HealthTech '13, Washington, DC, USA, August 12, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/healthtech13/workshop-program/presentation/chan}, timestamp = {Mon, 01 Feb 2021 08:43:15 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChanLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2013, editor = {David A. Basin and John C. Mitchell}, title = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1}, doi = {10.1007/978-3-642-36830-1}, isbn = {978-3-642-36829-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/LandwehrBMBLL12, author = {Carl E. Landwehr and Dan Boneh and John C. Mitchell and Steven M. Bellovin and Susan Landau and Michael E. Lesk}, title = {Privacy and Cybersecurity: The Next 100 Years}, journal = {Proc. {IEEE}}, volume = {100}, number = {Centennial-Issue}, pages = {1659--1673}, year = {2012}, url = {https://doi.org/10.1109/JPROC.2012.2189794}, doi = {10.1109/JPROC.2012.2189794}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/LandwehrBMBLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BarthRSMSB12, author = {Adam Barth and Benjamin I. P. Rubinstein and Mukund Sundararajan and John C. Mitchell and Dawn Song and Peter L. Bartlett}, title = {A Learning-Based Approach to Reactive Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {482--493}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.42}, doi = {10.1109/TDSC.2011.42}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BarthRSMSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Mitchell0SZ12, author = {John C. Mitchell and Rahul Sharma and Deian Stefan and Joe Zimmerman}, editor = {Stephen Chong}, title = {Information-Flow Control for Programming on Encrypted Data}, booktitle = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge, MA, USA, June 25-27, 2012}, pages = {45--60}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSF.2012.30}, doi = {10.1109/CSF.2012.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Mitchell0SZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfp/StefanRBLMM12, author = {Deian Stefan and Alejandro Russo and Pablo Buiras and Amit Levy and John C. Mitchell and David Mazi{\`{e}}res}, editor = {Peter Thiemann and Robby Bruce Findler}, title = {Addressing covert termination and timing channels in concurrent information flow systems}, booktitle = {{ACM} {SIGPLAN} International Conference on Functional Programming, ICFP'12, Copenhagen, Denmark, September 9-15, 2012}, pages = {201--214}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2364527.2364557}, doi = {10.1145/2364527.2364557}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfp/StefanRBLMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ihi/LamMSSW12, author = {Peifung E. Lam and John C. Mitchell and Andre Scedrov and Sharada Sundaram and Frank Wang}, editor = {Gang Luo and Jiming Liu and Christopher C. Yang}, title = {Declarative privacy policy: finite models and attribute-based encryption}, booktitle = {{ACM} International Health Informatics Symposium, {IHI} '12, Miami, FL, USA, January 28-30, 2012}, pages = {323--332}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2110363.2110401}, doi = {10.1145/2110363.2110401}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ihi/LamMSSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/GiffinLSTMMR12, author = {Daniel B. Giffin and Amit Levy and Deian Stefan and David Terei and David Mazi{\`{e}}res and John C. Mitchell and Alejandro Russo}, editor = {Chandu Thekkath and Amin Vahdat}, title = {Hails: Protecting Data Privacy in Untrusted Web Applications}, booktitle = {10th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2012, Hollywood, CA, USA, October 8-10, 2012}, pages = {47--60}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/osdi12/technical-sessions/presentation/giffin}, timestamp = {Tue, 02 Feb 2021 08:05:55 +0100}, biburl = {https://dblp.org/rec/conf/osdi/GiffinLSTMMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MayerM12, author = {Jonathan R. Mayer and John C. Mitchell}, title = {Third-Party Web Tracking: Policy and Technology}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {413--427}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.47}, doi = {10.1109/SP.2012.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MayerM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/BurszteinSBM12, author = {Elie Bursztein and Chinmay Soman and Dan Boneh and John C. Mitchell}, editor = {Alain Mille and Fabien Gandon and Jacques Misselis and Michael Rabinovich and Steffen Staab}, title = {SessionJuggler: secure web login from an untrusted terminal using session hijacking}, booktitle = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012, Lyon, France, April 16-20, 2012}, pages = {321--330}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2187836.2187880}, doi = {10.1145/2187836.2187880}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/BurszteinSBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-1457, author = {Deian Stefan and Alejandro Russo and John C. Mitchell and David Mazi{\`{e}}res}, title = {Flexible Dynamic Information Flow Control in the Presence of Exceptions}, journal = {CoRR}, volume = {abs/1207.1457}, year = {2012}, url = {http://arxiv.org/abs/1207.1457}, eprinttype = {arXiv}, eprint = {1207.1457}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-1457.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MitchellSSZ12, author = {John C. Mitchell and Rahul Sharma and Deian Stefan and Joe Zimmerman}, title = {Information-flow control for programming on encrypted data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2012}, url = {http://eprint.iacr.org/2012/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MitchellSSZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BauM11, author = {Jason Bau and John C. Mitchell}, title = {Security Modeling and Analysis}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {3}, pages = {18--25}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.2}, doi = {10.1109/MSP.2011.2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BauM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BurszteinMM11, author = {Elie Bursztein and Matthieu Martin and John C. Mitchell}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Text-based {CAPTCHA} strengths and weaknesses}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {125--138}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046724}, doi = {10.1145/2046707.2046724}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BurszteinMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BurszteinGM11, author = {Elie Bursztein and Baptiste Gourdin and John C. Mitchell}, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {Reclaiming the Blogosphere, TalkBack: {A} Secure LinkBack Protocol for Weblogs}, booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, pages = {133--149}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2\_8}, doi = {10.1007/978-3-642-23822-2\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BurszteinGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/BainMSSZ11, author = {Alex Bain and John C. Mitchell and Rahul Sharma and Deian Stefan and Joe Zimmerman}, editor = {Supratik Chakraborty and Amit Kumar}, title = {A Domain-Specific Language for Computing on Encrypted Data (Invited Talk)}, booktitle = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2011, December 12-14, 2011, Mumbai, India}, series = {LIPIcs}, volume = {13}, pages = {6--24}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2011}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2011.6}, doi = {10.4230/LIPICS.FSTTCS.2011.6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/BainMSSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haskell/StefanRMM11, author = {Deian Stefan and Alejandro Russo and John C. Mitchell and David Mazi{\`{e}}res}, editor = {Koen Claessen}, title = {Flexible dynamic information flow control in Haskell}, booktitle = {Proceedings of the 4th {ACM} {SIGPLAN} Symposium on Haskell, Haskell 2011, Tokyo, Japan, 22 September 2011}, pages = {95--106}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2034675.2034688}, doi = {10.1145/2034675.2034688}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haskell/StefanRMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/HinrichsGLSM11, author = {Timothy L. Hinrichs and William C. Garrison III and Adam J. Lee and Skip Saunders and John C. Mitchell}, editor = {Gilles Barthe and Anupam Datta and Sandro Etalle}, title = {{TBA} : {A} Hybrid of Logic and Extensional Access Control Systems}, booktitle = {Formal Aspects of Security and Trust - 8th International Workshop, {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7140}, pages = {198--213}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29420-4\_13}, doi = {10.1007/978-3-642-29420-4\_13}, timestamp = {Sat, 19 Oct 2019 20:16:12 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/HinrichsGLSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/StefanRMM11, author = {Deian Stefan and Alejandro Russo and David Mazi{\`{e}}res and John C. Mitchell}, editor = {Peeter Laud}, title = {Disjunction Category Labels}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {223--239}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_16}, doi = {10.1007/978-3-642-29615-4\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/StefanRMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sas/Mitchell11, author = {John C. Mitchell}, editor = {Eran Yahav}, title = {Program Analysis for Web Security}, booktitle = {Static Analysis - 18th International Symposium, {SAS} 2011, Venice, Italy, September 14-16, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6887}, pages = {4}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23702-7\_3}, doi = {10.1007/978-3-642-23702-7\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sas/Mitchell11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BurszteinBPPFM11, author = {Elie Bursztein and Romain Beauxis and Hristo S. Paskov and Daniele Perito and Celine Fabry and John C. Mitchell}, title = {The Failure of Noise-Based Non-continuous Audio Captchas}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {19--31}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.14}, doi = {10.1109/SP.2011.14}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/BurszteinBPPFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TalyEMMN11, author = {Ankur Taly and {\'{U}}lfar Erlingsson and John C. Mitchell and Mark S. Miller and Jasvir Nagra}, title = {Automated Analysis of Security-Critical JavaScript APIs}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {363--378}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.39}, doi = {10.1109/SP.2011.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/TalyEMMN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wollic/Mitchell11, author = {John C. Mitchell}, editor = {Lev D. Beklemishev and Ruy J. G. B. de Queiroz}, title = {A Symbolic Logic with Exact Bounds for Cryptographic Protocols}, booktitle = {Logic, Language, Information and Computation - 18th International Workshop, WoLLIC 2011, Philadelphia, PA, USA, May 18-20, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6642}, pages = {3}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20920-8\_3}, doi = {10.1007/978-3-642-20920-8\_3}, timestamp = {Tue, 01 Jun 2021 15:22:31 +0200}, biburl = {https://dblp.org/rec/conf/wollic/Mitchell11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/DattaM0S11, author = {Anupam Datta and John C. Mitchell and Arnab Roy and Stephan Hyeonjun Stiller}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Protocol Composition Logic}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {182--221}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-182}, doi = {10.3233/978-1-60750-714-7-182}, timestamp = {Fri, 15 May 2020 12:11:04 +0200}, biburl = {https://dblp.org/rec/books/ios/11/DattaM0S11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BainMSSZ11, author = {Alex Bain and John C. Mitchell and Rahul Sharma and Deian Stefan and Joe Zimmerman}, title = {A Domain-Specific Language for Computing on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {561}, year = {2011}, url = {http://eprint.iacr.org/2011/561}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BainMSSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RoyDDM10, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell}, title = {Inductive trace properties for computational security}, journal = {J. Comput. Secur.}, volume = {18}, number = {6}, pages = {1035--1073}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-389}, doi = {10.3233/JCS-2009-389}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RoyDDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AkhaweBLMS10, author = {Devdatta Akhawe and Adam Barth and Peifung E. Lam and John C. Mitchell and Dawn Song}, title = {Towards a Formal Foundation of Web Security}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {290--304}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.27}, doi = {10.1109/CSF.2010.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/AkhaweBLMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BarthRSMSB10, author = {Adam Barth and Benjamin I. P. Rubinstein and Mukund Sundararajan and John C. Mitchell and Dawn Song and Peter L. Bartlett}, editor = {Radu Sion}, title = {A Learning-Based Approach to Reactive Security}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {192--206}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_16}, doi = {10.1007/978-3-642-14577-3\_16}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BarthRSMSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BauM10, author = {Jason Bau and John C. Mitchell}, title = {A Security Evaluation of {DNSSEC} with {NSEC3}}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/security-evaluation-dnssec-nsec3}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BauM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MaffeisMT10, author = {Sergio Maffeis and John C. Mitchell and Ankur Taly}, title = {Object Capabilities and Isolation of Untrusted Web Applications}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {125--140}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.16}, doi = {10.1109/SP.2010.16}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/MaffeisMT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BauBGM10, author = {Jason Bau and Elie Bursztein and Divij Gupta and John C. Mitchell}, title = {State of the Art: Automated Black-Box Web Application Vulnerability Testing}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {332--345}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.27}, doi = {10.1109/SP.2010.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BauBGM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BurszteinBFMJ10, author = {Elie Bursztein and Steven Bethard and Celine Fabry and John C. Mitchell and Daniel Jurafsky}, title = {How Good Are Humans at Solving CAPTCHAs? {A} Large Scale Evaluation}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {399--413}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.31}, doi = {10.1109/SP.2010.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BurszteinBFMJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BriesemeisterDLSTDKSOM10, author = {Linda Briesemeister and Steven Dawson and Patrick Lincoln and Hassen Sa{\"{\i}}di and Jim Thornton and Glenn Durfee and Peter C. S. Kwan and Elizabeth Stinson and Adam J. Oliner and John C. Mitchell}, editor = {Nadav Aharony and Yaniv Altshuler and Yuval Elovici}, title = {Homogeneity as an Advantage: It Takes a Community to Protect an Application}, booktitle = {2010 Workshop on Collaborative Methods for Security and Privacy, CollSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/collsec10/homogeneity-advantage-it-takes-community-protect-application}, timestamp = {Mon, 01 Feb 2021 08:42:51 +0100}, biburl = {https://dblp.org/rec/conf/uss/BriesemeisterDLSTDKSOM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BurszteinGFBRBBM10, author = {Elie Bursztein and Baptiste Gourdin and Celine Fabry and Jason Bau and Gustav Rydstedt and Hristo Bojinov and Dan Boneh and John C. Mitchell}, editor = {Terry V. Benzel and Jelena Mirkovic and Angelos Stavrou}, title = {Webseclab Security Education Workbench}, booktitle = {3rd Workshop on Cyber Security Experimentation and Test, {CSET} '10, Washington, D.C., USA, August 9, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/cset10/webseclab-security-education-workbench}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/BurszteinGFBRBBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DattaDMNS10, author = {Anupam Datta and Nipun Dave and John C. Mitchell and Helen Nissenbaum and Divya Sharma}, editor = {Kevin Fu and Tadayoshi Kohno and Aviel D. Rubin}, title = {Privacy Challenges in Patient-centric Health Information Systems}, booktitle = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/healthsec10/privacy-challenges-patient-centric-health-information-systems}, timestamp = {Mon, 01 Feb 2021 08:43:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/DattaDMNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BauM10, author = {Jason Bau and John C. Mitchell}, title = {A Security Evaluation of {DNSSEC} with {NSEC3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2010}, url = {http://eprint.iacr.org/2010/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BauM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BarthJM09, author = {Adam Barth and Collin Jackson and John C. Mitchell}, title = {Securing frame communication in browsers}, journal = {Commun. {ACM}}, volume = {52}, number = {6}, pages = {83--91}, year = {2009}, url = {https://doi.org/10.1145/1516046.1516066}, doi = {10.1145/1516046.1516066}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BarthJM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BurszteinLM09, author = {Elie Bursztein and Peifung E. Lam and John C. Mitchell}, editor = {Radu Sion and Dawn Song}, title = {TrackBack spam: abuse and prevention}, booktitle = {Proceedings of the first {ACM} Cloud Computing Security Workshop, {CCSW} 2009, Chicago, IL, USA, November 13, 2009}, pages = {3--10}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655008.1655010}, doi = {10.1145/1655008.1655010}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BurszteinLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/BurszteinM09, author = {Elie Bursztein and John C. Mitchell}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Using Strategy Objectives for Network Security Analysis}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {337--349}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_25}, doi = {10.1007/978-3-642-16342-5\_25}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/BurszteinM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MaffeisMT09, author = {Sergio Maffeis and John C. Mitchell and Ankur Taly}, editor = {Michael Backes and Peng Ning}, title = {Isolating JavaScript with Filters, Rewriting, and Wrappers}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {505--522}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_31}, doi = {10.1007/978-3-642-04444-1\_31}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MaffeisMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/HinrichsGCMS09, author = {Timothy L. Hinrichs and Natasha Gude and Mart{\'{\i}}n Casado and John C. Mitchell and Scott Shenker}, editor = {Jeffrey C. Mogul}, title = {Practical declarative network management}, booktitle = {Proceedings of the 1st {ACM} {SIGCOMM} 2009 Workshop on Research on Enterprise Networking, {WREN} 2009, Barcelona, Spain, August 21, 2009}, pages = {1--10}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1592681.1592683}, doi = {10.1145/1592681.1592683}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/HinrichsGCMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/LamMS09, author = {Peifung E. Lam and John C. Mitchell and Sharada Sundaram}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {A Formalization of {HIPAA} for a Medical Messaging System}, booktitle = {Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5695}, pages = {73--85}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03748-1\_8}, doi = {10.1007/978-3-642-03748-1\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/LamMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2009P9073, editor = {Ruth Breu and John C. Mitchell and Janos Sztipanovits and Alfred Winter}, title = {Model-Based Design of Trustworthy Health Information Systems, 11.02. - 14.02.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09073}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/portals/09073/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2009P9073.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BreuMSW09, author = {Ruth Breu and John C. Mitchell and Janos Sztipanovits and Alfred Winter}, editor = {Ruth Breu and John C. Mitchell and Janos Sztipanovits and Alfred Winter}, title = {09073 Abstracts Collection - Model-Based Design of Trustworthy Health Information Systems}, booktitle = {Model-Based Design of Trustworthy Health Information Systems, 11.02. - 14.02.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09073}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1998/}, timestamp = {Thu, 10 Jun 2021 13:02:05 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BreuMSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-1155, author = {Adam Barth and Benjamin I. P. Rubinstein and Mukund Sundararajan and John C. Mitchell and Dawn Xiaodong Song and Peter L. Bartlett}, title = {A Learning-Based Approach to Reactive Security}, journal = {CoRR}, volume = {abs/0912.1155}, year = {2009}, url = {http://arxiv.org/abs/0912.1155}, eprinttype = {arXiv}, eprint = {0912.1155}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-1155.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KustersDMR08, author = {Ralf K{\"{u}}sters and Anupam Datta and John C. Mitchell and Ajith Ramanathan}, title = {On the Relationships between Notions of Simulation-Based Security}, journal = {J. Cryptol.}, volume = {21}, number = {4}, pages = {492--546}, year = {2008}, url = {https://doi.org/10.1007/s00145-008-9019-9}, doi = {10.1007/S00145-008-9019-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KustersDMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MitchellRRS08, author = {John C. Mitchell and Arnab Roy and Paul D. Rowe and Andre Scedrov}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Analysis of {EAP-GPSK} Authentication Protocol}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {309--327}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_19}, doi = {10.1007/978-3-540-68914-0\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MitchellRRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aplas/MaffeisMT08, author = {Sergio Maffeis and John C. Mitchell and Ankur Taly}, editor = {G. Ramalingam}, title = {An Operational Semantics for JavaScript}, booktitle = {Programming Languages and Systems, 6th Asian Symposium, {APLAS} 2008, Bangalore, India, December 9-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5356}, pages = {307--325}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89330-1\_22}, doi = {10.1007/978-3-540-89330-1\_22}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aplas/MaffeisMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BarthJM08, author = {Adam Barth and Collin Jackson and John C. Mitchell}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Robust defenses for cross-site request forgery}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {75--88}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455782}, doi = {10.1145/1455770.1455782}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BarthJM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MartignoniSFJM08, author = {Lorenzo Martignoni and Elizabeth Stinson and Matt Fredrikson and Somesh Jha and John C. Mitchell}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {A Layered Architecture for Detecting Malicious Behaviors}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {78--97}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_5}, doi = {10.1007/978-3-540-87403-4\_5}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/MartignoniSFJM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BarthJM08, author = {Adam Barth and Collin Jackson and John C. Mitchell}, editor = {Paul C. van Oorschot}, title = {Securing Frame Communication in Browsers}, booktitle = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August 1, 2008, San Jose, CA, {USA}}, pages = {17--30}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/sec08/tech/full\_papers/barth/barth.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BarthJM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StinsonM08, author = {Elizabeth Stinson and John C. Mitchell}, editor = {Dan Boneh and Tal Garfinkel and Dug Song}, title = {Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods}, booktitle = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose, CA, USA, July 28, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/woot08/tech/full\_papers/stinson/stinson.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StinsonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MitchellRS09, author = {John C. Mitchell and Arnab Roy and Mukund Sundararajan}, editor = {Daniel J. Dougherty and Santiago Escobar}, title = {An Automated Approach for Proving {PCL} Invariants}, booktitle = {Proceedings of the Third International Workshop on Security and Rewriting Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {234}, pages = {93--113}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.02.074}, doi = {10.1016/J.ENTCS.2009.02.074}, timestamp = {Thu, 09 Mar 2023 12:59:09 +0100}, biburl = {https://dblp.org/rec/journals/entcs/MitchellRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/StinsonM08, author = {Elizabeth Stinson and John C. Mitchell}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Characterizing Bots' Remote Control Behavior}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {45--64}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_3}, doi = {10.1007/978-0-387-68768-1\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/StinsonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BarthMDS07, author = {Adam Barth and John C. Mitchell and Anupam Datta and Sharada Sundaram}, title = {Privacy and Utility in Business Processes}, booktitle = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8 July 2007, Venice, Italy}, pages = {279--294}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CSF.2007.26}, doi = {10.1109/CSF.2007.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BarthMDS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/StinsonM07, author = {Elizabeth Stinson and John C. Mitchell}, editor = {Bernhard M. H{\"{a}}mmerli and Robin Sommer}, title = {Characterizing Bots' Remote Control Behavior}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, {DIMVA} 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4579}, pages = {89--108}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73614-1\_6}, doi = {10.1007/978-3-540-73614-1\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/StinsonM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RoyDDM07, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Inductive Proofs of Computational Secrecy}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {219--234}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_15}, doi = {10.1007/978-3-540-74835-9\_15}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RoyDDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/RoyDM07, author = {Arnab Roy and Anupam Datta and John C. Mitchell}, editor = {Gilles Barthe and C{\'{e}}dric Fournet}, title = {Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols}, booktitle = {Trustworthy Global Computing, Third Symposium, {TGC} 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4912}, pages = {312--329}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78663-4\_21}, doi = {10.1007/978-3-540-78663-4\_21}, timestamp = {Sat, 19 Oct 2019 20:09:31 +0200}, biburl = {https://dblp.org/rec/conf/tgc/RoyDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JacksonBM07, author = {Collin Jackson and Dan Boneh and John C. Mitchell}, title = {Transaction Generators: Root Kits for Web}, booktitle = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston, MA, USA, August 7, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/hotsec-07/transaction-generators-root-kits-web}, timestamp = {Mon, 01 Feb 2021 08:42:51 +0100}, biburl = {https://dblp.org/rec/conf/uss/JacksonBM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DattaDMR07, author = {Anupam Datta and Ante Derek and John C. Mitchell and Arnab Roy}, editor = {Luca Cardelli and Marcelo Fiore and Glynn Winskel}, title = {Protocol Composition Logic {(PCL)}}, booktitle = {Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin}, series = {Electronic Notes in Theoretical Computer Science}, volume = {172}, pages = {311--358}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.02.012}, doi = {10.1016/J.ENTCS.2007.02.012}, timestamp = {Tue, 24 Jan 2023 11:36:28 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DattaDMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyDDM07, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell}, title = {Inductive Proof Method for Computational Secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2007}, url = {http://eprint.iacr.org/2007/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyDDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LiM06, author = {Ninghui Li and John C. Mitchell}, title = {Understanding {SPKI/SDSI} using first-order logic}, journal = {Int. J. Inf. Sec.}, volume = {5}, number = {1}, pages = {48--64}, year = {2006}, url = {https://doi.org/10.1007/s10207-005-0073-0}, doi = {10.1007/S10207-005-0073-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LiM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/MitchellRST06, author = {John C. Mitchell and Ajith Ramanathan and Andre Scedrov and Vanessa Teague}, title = {A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols}, journal = {Theor. Comput. Sci.}, volume = {353}, number = {1-3}, pages = {118--164}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2005.10.044}, doi = {10.1016/J.TCS.2005.10.044}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/MitchellRST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BackesDDMT06, author = {Michael Backes and Anupam Datta and Ante Derek and John C. Mitchell and Mathieu Turuani}, title = {Compositional analysis of contract-signing protocols}, journal = {Theor. Comput. Sci.}, volume = {367}, number = {1-2}, pages = {33--56}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2006.08.039}, doi = {10.1016/J.TCS.2006.08.039}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BackesDDMT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/RoyDDMS06, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell and Jean{-}Pierre Seifert}, editor = {Mitsu Okada and Ichiro Satoh}, title = {Secrecy Analysis in Protocol Composition Logic}, booktitle = {Advances in Computer Science - {ASIAN} 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4435}, pages = {197--213}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-77505-8\_15}, doi = {10.1007/978-3-540-77505-8\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/RoyDDMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DattaDMW06, author = {Anupam Datta and Ante Derek and John C. Mitchell and Bogdan Warinschi}, title = {Computationally Sound Compositional Logic for Key Exchange Protocols}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {321--334}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.9}, doi = {10.1109/CSFW.2006.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DattaDMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/BarthM06, author = {Adam Barth and John C. Mitchell}, title = {Managing Digital Rights using Linear Logic}, booktitle = {21th {IEEE} Symposium on Logic in Computer Science {(LICS} 2006), 12-15 August 2006, Seattle, WA, USA, Proceedings}, pages = {127--136}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/LICS.2006.32}, doi = {10.1109/LICS.2006.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/BarthM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BarthDMN06, author = {Adam Barth and Anupam Datta and John C. Mitchell and Helen Nissenbaum}, title = {Privacy and Contextual Integrity: Framework and Applications}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {184--198}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.32}, doi = {10.1109/SP.2006.32}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/BarthDMN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DattaDMRS06, author = {Anupam Datta and Ante Derek and John C. Mitchell and Ajith Ramanathan and Andre Scedrov}, editor = {Shai Halevi and Tal Rabin}, title = {Games and the Impossibility of Realizable Ideal Functionality}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {360--379}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_19}, doi = {10.1007/11681878\_19}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DattaDMRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/JacksonBBM06a, author = {Collin Jackson and Andrew Bortz and Dan Boneh and John C. Mitchell}, editor = {Les Carr and David De Roure and Arun Iyengar and Carole A. Goble and Michael Dahlin}, title = {Protecting browser state from web privacy attacks}, booktitle = {Proceedings of the 15th international conference on World Wide Web, {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006}, pages = {737--744}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1135777.1135884}, doi = {10.1145/1135777.1135884}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/JacksonBBM06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDMW06, author = {Anupam Datta and Ante Derek and John C. Mitchell and Bogdan Warinschi}, title = {Key Exchange Protocols: Security Definition, Proof Method and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2006}, url = {http://eprint.iacr.org/2006/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaKMR06, author = {Anupam Datta and Ralf K{\"{u}}sters and John C. Mitchell and Ajith Ramanathan}, title = {On the Relationships Between Notions of Simulation-Based Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2006}, url = {http://eprint.iacr.org/2006/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaKMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyDDM06, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell}, title = {Inductive Trace Properties for Computational Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2006}, url = {http://eprint.iacr.org/2006/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyDDM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/LiMW05, author = {Ninghui Li and John C. Mitchell and William H. Winsborough}, title = {Beyond proof-of-compliance: security analysis in trust management}, journal = {J. {ACM}}, volume = {52}, number = {3}, pages = {474--514}, year = {2005}, url = {https://doi.org/10.1145/1066100.1066103}, doi = {10.1145/1066100.1066103}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/LiMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DattaDMP05, author = {Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic}, title = {A derivation system and compositional logic for security protocols}, journal = {J. Comput. Secur.}, volume = {13}, number = {3}, pages = {423--482}, year = {2005}, url = {https://doi.org/10.3233/jcs-2005-13304}, doi = {10.3233/JCS-2005-13304}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DattaDMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/ChadhaMSS05, author = {Rohit Chadha and John C. Mitchell and Andre Scedrov and Vitaly Shmatikov}, title = {Contract signing, optimism, and advantage}, journal = {J. Log. Algebraic Methods Program.}, volume = {64}, number = {2}, pages = {189--218}, year = {2005}, url = {https://doi.org/10.1016/j.jlap.2004.09.003}, doi = {10.1016/J.JLAP.2004.09.003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jlp/ChadhaMSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeSDDM05, author = {Changhua He and Mukund Sundararajan and Anupam Datta and Ante Derek and John C. Mitchell}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {A modular correctness proof of {IEEE} 802.11i and {TLS}}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {2--15}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102124}, doi = {10.1145/1102120.1102124}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HeSDDM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesDDMT05, author = {Michael Backes and Anupam Datta and Ante Derek and John C. Mitchell and Mathieu Turuani}, title = {Compositional Analysis of Contract Signing Protocols}, booktitle = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005), 20-22 June 2005, Aix-en-Provence, France}, pages = {94--110}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSFW.2005.12}, doi = {10.1109/CSFW.2005.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesDDMT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/DattaDMST05, author = {Anupam Datta and Ante Derek and John C. Mitchell and Vitaly Shmatikov and Mathieu Turuani}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Probabilistic Polynomial-Time Semantics for a Protocol Security Logic}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {16--29}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_2}, doi = {10.1007/11523468\_2}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/DattaDMST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HeM05, author = {Changhua He and John C. Mitchell}, title = {Security Analysis and Improvements for {IEEE} 802.11i}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2005, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2005}, url = {https://www.ndss-symposium.org/ndss2005/security-analysis-and-improvements-ieee-80211i/}, timestamp = {Mon, 01 Feb 2021 08:42:12 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HeM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/BarthM05, author = {Adam Barth and John C. Mitchell}, editor = {Catherine Meadows}, title = {Enterprise privacy promises and enforcement}, booktitle = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, pages = {58--66}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1045405.1045412}, doi = {10.1145/1045405.1045412}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/popl/BarthM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppdp/Mitchell05, author = {John C. Mitchell}, editor = {Pedro Barahona and Amy P. Felty}, title = {Security analysis of network protocols: logical and computational methods}, booktitle = {Proceedings of the 7th International {ACM} {SIGPLAN} Conference on Principles and Practice of Declarative Programming, July 11-13 2005, Lisbon, Portugal}, pages = {151--152}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1069774.1069788}, doi = {10.1145/1069774.1069788}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ppdp/Mitchell05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DattaKMR05, author = {Anupam Datta and Ralf K{\"{u}}sters and John C. Mitchell and Ajith Ramanathan}, editor = {Joe Kilian}, title = {On the Relationships Between Notions of Simulation-Based Security}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {476--494}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_26}, doi = {10.1007/978-3-540-30576-7\_26}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DattaKMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RossJMBM05, author = {Blake Ross and Collin Jackson and Nick Miyake and Dan Boneh and John C. Mitchell}, editor = {Patrick D. McDaniel}, title = {Stronger Password Authentication Using Browser Extensions}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/stronger-password-authentication-using-browser-extensions}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/RossJMBM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2005fmse, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-231-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2005fmse.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDMRS05, author = {Anupam Datta and Ante Derek and John C. Mitchell and Ajith Ramanathan and Andre Scedrov}, title = {Games and the Impossibility of Realizable Ideal Functionality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2005}, url = {http://eprint.iacr.org/2005/211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDMRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChanderDM04, author = {Ajay Chander and Drew Dean and John C. Mitchell}, title = {Reconstructing Trust Management}, journal = {J. Comput. Secur.}, volume = {12}, number = {1}, pages = {131--164}, year = {2004}, url = {https://doi.org/10.3233/jcs-2004-12106}, doi = {10.3233/JCS-2004-12106}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ChanderDM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DurginLM04, author = {Nancy A. Durgin and Patrick Lincoln and John C. Mitchell}, title = {Multiset rewriting and the complexity of bounded security protocols}, journal = {J. Comput. Secur.}, volume = {12}, number = {2}, pages = {247--311}, year = {2004}, url = {https://doi.org/10.3233/jcs-2004-12203}, doi = {10.3233/JCS-2004-12203}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DurginLM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiMT04, author = {Ninghui Li and John C. Mitchell and Derrick Tong}, title = {Securing Java RMI-Based Distributed Applications}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {262--271}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.34}, doi = {10.1109/CSAC.2004.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiMT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DattaDMP04, author = {Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic}, title = {Abstraction and Refinement in Protocol Derivation}, booktitle = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004), 28-30 June 2004, Pacific Grove, CA, {USA}}, pages = {30}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.4}, doi = {10.1109/CSFW.2004.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DattaDMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/RamanathanMST04, author = {Ajith Ramanathan and John C. Mitchell and Andre Scedrov and Vanessa Teague}, editor = {Igor Walukiewicz}, title = {Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols}, booktitle = {Foundations of Software Science and Computation Structures, 7th International Conference, {FOSSACS} 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2987}, pages = {468--483}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24727-2\_33}, doi = {10.1007/978-3-540-24727-2\_33}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/RamanathanMST04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChanderDM04, author = {Ajay Chander and Drew Dean and John C. Mitchell}, editor = {Kan Zhang and Yuliang Zheng}, title = {A Distributed High Assurance Reference Monitor}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {231--244}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_20}, doi = {10.1007/978-3-540-30144-8\_20}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/isw/ChanderDM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChouLTM04, author = {Neil Chou and Robert Ledesma and Yuka Teraguchi and John C. Mitchell}, title = {Client-Side Defense Against Web-Based Identity Theft}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2004, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2004}, url = {https://www.ndss-symposium.org/ndss2004/client-side-defense-against-web-based-identity-theft/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ChouLTM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BarthMR04, author = {Adam Barth and John C. Mitchell and Justin Rosenstein}, editor = {Vijay Atluri and Paul F. Syverson and Sabrina De Capitani di Vimercati}, title = {Conflict and combination in privacy policy languages}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2004, Washington, DC, USA, October 28, 2004}, pages = {45--46}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029179.1029195}, doi = {10.1145/1029179.1029195}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BarthMR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ws/HeM04, author = {Changhua He and John C. Mitchell}, editor = {Markus Jakobsson and Adrian Perrig}, title = {Analysis of the 802.11i 4-way handshake}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004}, pages = {43--50}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1023646.1023655}, doi = {10.1145/1023646.1023655}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/HeM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifipTCS/2004, editor = {Jean{-}Jacques L{\'{e}}vy and Ernst W. Mayr and John C. Mitchell}, title = {Exploring New Frontiers of Theoretical Informatics, {IFIP} 18th World Computer Congress, {TC1} 3rd International Conference on Theoretical Computer Science (TCS2004), 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {155}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/b98989}, doi = {10.1007/B98989}, isbn = {1-4020-8140-5}, timestamp = {Fri, 27 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifipTCS/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0007317, author = {John C. Mitchell}, title = {Concepts in programming languages}, publisher = {Cambridge University Press}, year = {2003}, isbn = {978-0-521-78098-8}, timestamp = {Thu, 03 Feb 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0007317.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/FreundM03, author = {Stephen N. Freund and John C. Mitchell}, title = {A Type System for the Java Bytecode Language and Verifier}, journal = {J. Autom. Reason.}, volume = {30}, number = {3-4}, pages = {271--321}, year = {2003}, url = {https://doi.org/10.1023/A:1025011624925}, doi = {10.1023/A:1025011624925}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/FreundM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LiWM03, author = {Ninghui Li and William H. Winsborough and John C. Mitchell}, title = {Distributed Credential Chain Discovery in Trust Management}, journal = {J. Comput. Secur.}, volume = {11}, number = {1}, pages = {35--86}, year = {2003}, url = {https://doi.org/10.3233/jcs-2003-11102}, doi = {10.3233/JCS-2003-11102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LiWM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DurginMP03, author = {Nancy A. Durgin and John C. Mitchell and Dusko Pavlovic}, title = {A Compositional Logic for Proving Security Properties of Protocols}, journal = {J. Comput. Secur.}, volume = {11}, number = {4}, pages = {677--722}, year = {2003}, url = {https://doi.org/10.3233/jcs-2003-11407}, doi = {10.3233/JCS-2003-11407}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DurginMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/DebbabiDMM03, author = {Mourad Debbabi and Nancy A. Durgin and Mohamed Mejri and John C. Mitchell}, title = {Security by typing}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {4}, number = {4}, pages = {472--495}, year = {2003}, url = {https://doi.org/10.1007/s10009-002-0100-7}, doi = {10.1007/S10009-002-0100-7}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/DebbabiDMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DattaDMP03, author = {Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic}, editor = {Michael Backes and David A. Basin}, title = {Secure protocol composition}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {11--23}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035431}, doi = {10.1145/1035429.1035431}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DattaDMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesMM03, author = {Michael Backes and Catherine Meadows and John C. Mitchell}, editor = {Michael Backes and David A. Basin}, title = {Relating cryptography and formal methods: a panel}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {61--66}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035436}, doi = {10.1145/1035429.1035436}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BackesMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/MateusMS03, author = {Paulo Mateus and John C. Mitchell and Andre Scedrov}, editor = {Roberto M. Amadio and Denis Lugiez}, title = {Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus}, booktitle = {{CONCUR} 2003 - Concurrency Theory, 14th International Conference, Marseille, France, September 3-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2761}, pages = {323--345}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45187-7\_22}, doi = {10.1007/978-3-540-45187-7\_22}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/MateusMS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/ChadhaMSS03, author = {Rohit Chadha and John C. Mitchell and Andre Scedrov and Vitaly Shmatikov}, editor = {Roberto M. Amadio and Denis Lugiez}, title = {Contract Signing, Optimism, and Advantage}, booktitle = {{CONCUR} 2003 - Concurrency Theory, 14th International Conference, Marseille, France, September 3-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2761}, pages = {361--377}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45187-7\_24}, doi = {10.1007/978-3-540-45187-7\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/ChadhaMSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LiM03, author = {Ninghui Li and John C. Mitchell}, title = {Understanding {SPKI/SDSI} Using First-Order Logic}, booktitle = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003), 30 June - 2 July 2003, Pacific Grove, CA, {USA}}, pages = {89}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSFW.2003.1212707}, doi = {10.1109/CSFW.2003.1212707}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/LiM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DattaDMP03, author = {Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic}, title = {A Derivation System for Security Protocols and its Logical Formalization}, booktitle = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003), 30 June - 2 July 2003, Pacific Grove, CA, {USA}}, pages = {109--125}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSFW.2003.1212708}, doi = {10.1109/CSFW.2003.1212708}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DattaDMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/discex/LiM03, author = {Ninghui Li and John C. Mitchell}, title = {A Role-based Trust-management Framework}, booktitle = {3rd {DARPA} Information Survivability Conference and Exposition {(DISCEX-III} 2003), 22-24 April 2003, Washington, DC, {USA}}, pages = {201}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DISCEX.2003.1194885}, doi = {10.1109/DISCEX.2003.1194885}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/discex/LiM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfps/DattaDMP03, author = {Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic}, editor = {Stephen D. Brookes and Prakash Panangaden}, title = {Secure Protocol Composition}, booktitle = {Proceedings of 19th Conference on the Mathematical Foundations of Programming Semantics, {MFPS} 2003, Universit{\'{e}} de Montr{\'{e}}al, QC, Canada, March 19-22, 2003}, series = {Electronic Notes in Theoretical Computer Science}, volume = {83}, pages = {201--226}, publisher = {Elsevier}, year = {2003}, url = {https://doi.org/10.1016/S1571-0661(03)50011-1}, doi = {10.1016/S1571-0661(03)50011-1}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mfps/DattaDMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/padl/LiM03, author = {Ninghui Li and John C. Mitchell}, editor = {Ver{\'{o}}nica Dahl and Philip Wadler}, title = {{DATALOG} with Constraints: {A} Foundation for Trust Management Languages}, booktitle = {Practical Aspects of Declarative Languages, 5th International Symposium, {PADL} 2003, New Orleans, LA, USA, January 13-14, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2562}, pages = {58--73}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36388-2\_6}, doi = {10.1007/3-540-36388-2\_6}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/padl/LiM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiWM03, author = {Ninghui Li and William H. Winsborough and John C. Mitchell}, title = {Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management}, booktitle = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14 May 2003, Berkeley, CA, {USA}}, pages = {123--139}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199332}, doi = {10.1109/SECPRI.2003.1199332}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiWM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LieMTH03, author = {David Lie and John C. Mitchell and Chandramohan A. Thekkath and Mark Horowitz}, title = {Specifying and Verifying Hardware for Tamper-Resistant Software}, booktitle = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14 May 2003, Berkeley, CA, {USA}}, pages = {166}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199335}, doi = {10.1109/SECPRI.2003.1199335}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LieMTH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ShmatikovM02, author = {Vitaly Shmatikov and John C. Mitchell}, title = {Finite-state analysis of two contract signing protocols}, journal = {Theor. Comput. Sci.}, volume = {283}, number = {2}, pages = {419--450}, year = {2002}, url = {https://doi.org/10.1016/S0304-3975(01)00141-4}, doi = {10.1016/S0304-3975(01)00141-4}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ShmatikovM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isss2/MitchellT02, author = {John C. Mitchell and Vanessa Teague}, editor = {Mitsuhiro Okada and Benjamin C. Pierce and Andre Scedrov and Hideyuki Tokuda and Akinori Yonezawa}, title = {Autonomous Nodes and Distributed Mechanisms}, booktitle = {Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2609}, pages = {58--83}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36532-X\_5}, doi = {10.1007/3-540-36532-X\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/isss2/MitchellT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isss2/CervesatoDLMS02, author = {Iliano Cervesato and Nancy A. Durgin and Patrick Lincoln and John C. Mitchell and Andre Scedrov}, editor = {Mitsuhiro Okada and Benjamin C. Pierce and Andre Scedrov and Hideyuki Tokuda and Akinori Yonezawa}, title = {A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis}, booktitle = {Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2609}, pages = {356--383}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36532-X\_22}, doi = {10.1007/3-540-36532-X\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isss2/CervesatoDLMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/Mitchell02, author = {John C. Mitchell}, editor = {Sophie Tison}, title = {Multiset Rewriting and Security Protocol Analysis}, booktitle = {Rewriting Techniques and Applications, 13th International Conference, {RTA} 2002, Copenhagen, Denmark, July 22-24, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2378}, pages = {19--22}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45610-4\_2}, doi = {10.1007/3-540-45610-4\_2}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/Mitchell02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiMW02, author = {Ninghui Li and John C. Mitchell and William H. Winsborough}, title = {Design of a Role-Based Trust-Management Framework}, booktitle = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002}, pages = {114--130}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SECPRI.2002.1004366}, doi = {10.1109/SECPRI.2002.1004366}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiMW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/popl/2002, editor = {John Launchbury and John C. Mitchell}, title = {Conference Record of {POPL} 2002: The 29th {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, Portland, OR, USA, January 16-18, 2002}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/503272}, doi = {10.1145/503272}, isbn = {1-58113-450-9}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiWM01, author = {Ninghui Li and William H. Winsborough and John C. Mitchell}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Distributed credential chain discovery in trust management: extended abstract}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {156--165}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502005}, doi = {10.1145/501983.502005}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiWM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChanderMD01, author = {Ajay Chander and John C. Mitchell and Drew Dean}, title = {A State-Transition Model of Trust Management and Access Control}, booktitle = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada}, pages = {27--43}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CSFW.2001.930134}, doi = {10.1109/CSFW.2001.930134}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChanderMD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DurginMP01, author = {Nancy A. Durgin and John C. Mitchell and Dusko Pavlovic}, title = {A Compositional Logic for Protocol Correctness}, booktitle = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada}, pages = {241--255}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CSFW.2001.930150}, doi = {10.1109/CSFW.2001.930150}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DurginMP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/Mitchell01, author = {John C. Mitchell}, editor = {David Sands}, title = {Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis}, booktitle = {Programming Languages and Systems, 10th European Symposium on Programming, {ESOP} 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2028}, pages = {23--29}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45309-1\_2}, doi = {10.1007/3-540-45309-1\_2}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/esop/Mitchell01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/MitchellRST01, author = {John C. Mitchell and Ajith Ramanathan and Andre Scedrov and Vanessa Teague}, title = {Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis}, booktitle = {16th Annual {IEEE} Symposium on Logic in Computer Science, Boston, Massachusetts, USA, June 16-19, 2001, Proceedings}, pages = {3--5}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/LICS.2001.932477}, doi = {10.1109/LICS.2001.932477}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/MitchellRST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/Mitchell01, author = {John C. Mitchell}, editor = {Chris Hankin and Dave Schmidt}, title = {Programming language methods in computer security}, booktitle = {Conference Record of {POPL} 2001: The 28th {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, London, UK, January 17-19, 2001}, pages = {1--3}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/360204.360205}, doi = {10.1145/360204.360205}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/Mitchell01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MitchellRST01, author = {John C. Mitchell and Ajith Ramanathan and Andre Scedrov and Vanessa Teague}, editor = {Stephen D. Brookes and Michael W. Mislove}, title = {A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report)}, booktitle = {Seventeenth Conference on the Mathematical Foundations of Programming Semantics, {MFPS} 2001, Aarhus, Denmark, May 23-26, 2001}, series = {Electronic Notes in Theoretical Computer Science}, volume = {45}, pages = {280--310}, publisher = {Elsevier}, year = {2001}, url = {https://doi.org/10.1016/S1571-0661(04)80968-X}, doi = {10.1016/S1571-0661(04)80968-X}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/MitchellRST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/LieTMLBMH00, author = {David Lie and Chandramohan A. Thekkath and Mark Mitchell and Patrick Lincoln and Dan Boneh and John C. Mitchell and Mark Horowitz}, editor = {Larry Rudolph and Anoop Gupta}, title = {Architectural Support for Copy and Tamper Resistant Software}, booktitle = {{ASPLOS-IX} Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, November 12-15, 2000}, pages = {168--177}, publisher = {{ACM} Press}, year = {2000}, url = {https://doi.org/10.1145/378993.379237}, doi = {10.1145/378993.379237}, timestamp = {Wed, 07 Jul 2021 13:23:08 +0200}, biburl = {https://dblp.org/rec/conf/asplos/LieTMLBMH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CervesatoDMLS00, author = {Iliano Cervesato and Nancy A. Durgin and John C. Mitchell and Patrick Lincoln and Andre Scedrov}, title = {Relating Strands and Multiset Rewriting for Security Protocol Analysis}, booktitle = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop, {CSFW} '00, Cambridge, England, UK, July 3-5, 2000}, pages = {35--51}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/CSFW.2000.856924}, doi = {10.1109/CSFW.2000.856924}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CervesatoDMLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ShmatikovM00, author = {Vitaly Shmatikov and John C. Mitchell}, editor = {Yair Frankel}, title = {Analysis of Abuse-Free Contract Signing}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {174--191}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_13}, doi = {10.1007/3-540-45472-1\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ShmatikovM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ShmatikovM00, author = {Vitaly Shmatikov and John C. Mitchell}, title = {Analysis of a Fair Exchange Protocol}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2000, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2000}, url = {https://www.ndss-symposium.org/ndss2000/analysis-fair-exchange-protocol-paper/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ShmatikovM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/HarperM99, author = {Robert Harper and John C. Mitchell}, title = {Parametricity and Variants of Girard's \emph{J} Operator}, journal = {Inf. Process. Lett.}, volume = {70}, number = {1}, pages = {1--5}, year = {1999}, url = {https://doi.org/10.1016/S0020-0190(99)00036-8}, doi = {10.1016/S0020-0190(99)00036-8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/HarperM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LincolnMS99, author = {Patrick Lincoln and John C. Mitchell and Andre Scedrov}, title = {Optimization Complexity of Linear Logic Proof Games}, journal = {Theor. Comput. Sci.}, volume = {227}, number = {1-2}, pages = {299--331}, year = {1999}, url = {https://doi.org/10.1016/S0304-3975(99)00057-2}, doi = {10.1016/S0304-3975(99)00057-2}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/LincolnMS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/FreundM99, author = {Stephen N. Freund and John C. Mitchell}, title = {The type system for object initializatiion in the Jave bytecode language}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {21}, number = {6}, pages = {1196--1250}, year = {1999}, url = {https://doi.org/10.1145/330643.330646}, doi = {10.1145/330643.330646}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/FreundM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CervesatoDLMS99, author = {Iliano Cervesato and Nancy A. Durgin and Patrick Lincoln and John C. Mitchell and Andre Scedrov}, title = {A Meta-Notation for Protocol Analysis}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {55--69}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779762}, doi = {10.1109/CSFW.1999.779762}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CervesatoDLMS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/LincolnMMS99, author = {Patrick Lincoln and John C. Mitchell and Mark Mitchell and Andre Scedrov}, editor = {Jeannette M. Wing and Jim Woodcock and Jim Davies}, title = {Probabilistic Polynomial-Time Equivalence and Security Analysis}, booktitle = {FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume {I}}, series = {Lecture Notes in Computer Science}, volume = {1708}, pages = {776--793}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48119-2\_43}, doi = {10.1007/3-540-48119-2\_43}, timestamp = {Fri, 17 Feb 2023 09:02:00 +0100}, biburl = {https://dblp.org/rec/conf/fm/LincolnMMS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/FreundM99, author = {Stephen N. Freund and John C. Mitchell}, editor = {Brent Hailpern and Linda M. Northrop and A. Michael Berman}, title = {A Formal Framework for the Java Bytecode Language and Verifier}, booktitle = {Proceedings of the 1999 {ACM} {SIGPLAN} Conference on Object-Oriented Programming Systems, Languages {\&} Applications, {OOPSLA} 1999, Denver, Colorado, USA, November 1-5, 1999}, pages = {147--166}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/320384.320397}, doi = {10.1145/320384.320397}, timestamp = {Wed, 30 Mar 2022 13:58:42 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/FreundM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BonoMPS99, author = {Viviana Bono and John C. Mitchell and Amit Patel and Vitaly Shmatikov}, editor = {Stephen D. Brookes and Achim Jung and Michael W. Mislove and Andre Scedrov}, title = {A Core Calculus of Classes and Objects}, booktitle = {Fifteenth Conference on Mathematical Foundations of Progamming Semantics, {MFPS} 1999, Tulane University, New Orleans, LA, USA, April 28 - May 1, 1999}, series = {Electronic Notes in Theoretical Computer Science}, volume = {20}, pages = {28--49}, publisher = {Elsevier}, year = {1999}, url = {https://doi.org/10.1016/S1571-0661(04)80065-3}, doi = {10.1016/S1571-0661(04)80065-3}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BonoMPS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tapos/FisherM98, author = {Kathleen Fisher and John C. Mitchell}, title = {On the Relationship Between Classes, Objects, and Data Abstraction}, journal = {Theory Pract. Object Syst.}, volume = {4}, number = {1}, pages = {3--25}, year = {1998}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tapos/FisherM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/Mitchell98, author = {John C. Mitchell}, editor = {Alan J. Hu and Moshe Y. Vardi}, title = {Finite-State Analysis of Security Protocols}, booktitle = {Computer Aided Verification, 10th International Conference, {CAV} '98, Vancouver, BC, Canada, June 28 - July 2, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1427}, pages = {71--76}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0028734}, doi = {10.1007/BFB0028734}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/Mitchell98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LincolnMMS98, author = {Patrick Lincoln and John C. Mitchell and Mark Mitchell and Andre Scedrov}, editor = {Li Gong and Michael K. Reiter}, title = {A Probabilistic Poly-Time Framework for Protocol Analysis}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {112--121}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288117}, doi = {10.1145/288090.288117}, timestamp = {Tue, 10 Nov 2020 20:00:11 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LincolnMMS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/MitchellMS98, author = {John C. Mitchell and Mark Mitchell and Andre Scedrov}, title = {A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time}, booktitle = {39th Annual Symposium on Foundations of Computer Science, {FOCS} '98, November 8-11, 1998, Palo Alto, California, {USA}}, pages = {725--733}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/SFCS.1998.743523}, doi = {10.1109/SFCS.1998.743523}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/MitchellMS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/FreundM98, author = {Stephen N. Freund and John C. Mitchell}, editor = {Bj{\o}rn N. Freeman{-}Benson and Craig Chambers}, title = {A Type System for Object Initialization in the Java Bytecode Language}, booktitle = {Proceedings of the 1998 {ACM} {SIGPLAN} Conference on Object-Oriented Programming Systems, Languages {\&} Applications, {OOPSLA} 1998, Vancouver, British Columbia, Canada, October 18-22, 1998}, pages = {310--327}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/286936.286972}, doi = {10.1145/286936.286972}, timestamp = {Wed, 30 Mar 2022 13:58:30 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/FreundM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MitchellSS98, author = {John C. Mitchell and Vitaly Shmatikov and Ulrich Stern}, editor = {Aviel D. Rubin}, title = {Finite-State Analysis of {SSL} 3.0}, booktitle = {Proceedings of the 7th {USENIX} Security Symposium, San Antonio, TX, USA, January 26-29, 1998}, publisher = {{USENIX} Association}, year = {1998}, url = {https://www.usenix.org/conference/7th-usenix-security-symposium/finite-state-analysis-ssl-30}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MitchellSS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/MitchellR97, author = {John C. Mitchell and Jon G. Riecke}, title = {The analysis of programming structure}, journal = {{SIGACT} News}, volume = {28}, number = {2}, pages = {24--31}, year = {1997}, url = {https://doi.org/10.1145/261342.262782}, doi = {10.1145/261342.262782}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigact/MitchellR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigplan/HarperM97, author = {Robert Harper and John C. Mitchell}, title = {{ML} and Beyond}, journal = {{ACM} {SIGPLAN} Notices}, volume = {32}, number = {1}, pages = {80--85}, year = {1997}, url = {https://doi.org/10.1145/251595.251603}, doi = {10.1145/251595.251603}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigplan/HarperM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/AgesenFM97, author = {Ole Agesen and Stephen N. Freund and John C. Mitchell}, editor = {Mary E. S. Loomis and Toby Bloom and A. Michael Berman}, title = {Adding Type Parameterization to the Java Language}, booktitle = {Proceedings of the 1997 {ACM} {SIGPLAN} Conference on Object-Oriented Programming Systems, Languages {\&} Applications, {OOPSLA} 1997, Atlanta, Georgia, October 5-9, 1997}, pages = {49--65}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/263698.263720}, doi = {10.1145/263698.263720}, timestamp = {Wed, 30 Mar 2022 13:58:18 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/AgesenFM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MitchellMS97, author = {John C. Mitchell and Mark Mitchell and Ulrich Stern}, title = {Automated analysis of cryptographic protocols using Mur-phi}, booktitle = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, {USA}}, pages = {141--151}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SECPRI.1997.601329}, doi = {10.1109/SECPRI.1997.601329}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/MitchellMS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/FreundM97, author = {Stephen N. Freund and John C. Mitchell}, editor = {Andrew D. Gordon and Andrew M. Pitts and Carolyn L. Talcott}, title = {A Type System For Object Initialization In the Java Bytecode Language}, booktitle = {Second Workshop on Higher-Order Operational Techniques in Semantics, {HOOTS} 1997, Stanford, CA, USA, December 8-12, 1997}, series = {Electronic Notes in Theoretical Computer Science}, volume = {10}, pages = {242--245}, publisher = {Elsevier}, year = {1997}, url = {https://doi.org/10.1016/S1571-0661(05)80703-0}, doi = {10.1016/S1571-0661(05)80703-0}, timestamp = {Fri, 11 Nov 2022 13:29:29 +0100}, biburl = {https://dblp.org/rec/journals/entcs/FreundM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0085577, author = {John C. Mitchell}, title = {Foundations for programming languages}, series = {Foundation of computing series}, publisher = {{MIT} Press}, year = {1996}, isbn = {978-0-262-13321-0}, timestamp = {Wed, 27 Apr 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0085577.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bsl/LincolnMS96, author = {Patrick Lincoln and John C. Mitchell and Andre Scedrov}, title = {Linear logic proof games and optimization}, journal = {Bull. Symb. Log.}, volume = {2}, number = {3}, pages = {322--338}, year = {1996}, url = {https://doi.org/10.2307/420993}, doi = {10.2307/420993}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bsl/LincolnMS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HarperM96, author = {Robert Harper and John C. Mitchell}, title = {{ML} and Beyond}, journal = {{ACM} Comput. Surv.}, volume = {28}, number = {4es}, pages = {219}, year = {1996}, url = {https://doi.org/10.1145/242224.242438}, doi = {10.1145/242224.242438}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/HarperM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/GunterMN96, author = {Carl A. Gunter and John C. Mitchell and David Notkin}, title = {Strategic Directions in Software Engineering and Programming Languages}, journal = {{ACM} Comput. Surv.}, volume = {28}, number = {4}, pages = {727--737}, year = {1996}, url = {https://doi.org/10.1145/242223.242283}, doi = {10.1145/242223.242283}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/GunterMN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Viswanathan96, author = {John C. Mitchell and Ramesh Viswanathan}, title = {Standard {ML-NJ} Weak Polymorphism and Imperative Constructs}, journal = {Inf. Comput.}, volume = {127}, number = {2}, pages = {102--116}, year = {1996}, url = {https://doi.org/10.1006/inco.1996.0054}, doi = {10.1006/INCO.1996.0054}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/Viswanathan96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/MitchellV96, author = {John C. Mitchell and Ramesh Viswanathan}, editor = {Friedhelm Meyer auf der Heide and Burkhard Monien}, title = {Effective Models of Polymorphism, Subtyping and Recursion (Extended Abstract)}, booktitle = {Automata, Languages and Programming, 23rd International Colloquium, ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1099}, pages = {170--181}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61440-0\_126}, doi = {10.1007/3-540-61440-0\_126}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/MitchellV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/LincolnMS96, author = {Patrick Lincoln and John C. Mitchell and Andre Scedrov}, editor = {Jean{-}Yves Girard and Mitsuhiro Okada and Andre Scedrov}, title = {The Complexity of Local Proof Search in Linear Logic}, booktitle = {Linear Logic Tokyo Meeting 1996, Keio University, Mita Campus, Tokyo, Japan, March 29 - April 2, 1996}, series = {Electronic Notes in Theoretical Computer Science}, volume = {3}, pages = {120--129}, publisher = {Elsevier}, year = {1996}, url = {https://doi.org/10.1016/S1571-0661(05)80410-4}, doi = {10.1016/S1571-0661(05)80410-4}, timestamp = {Fri, 11 Nov 2022 13:19:20 +0100}, biburl = {https://dblp.org/rec/journals/entcs/LincolnMS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tapos/FisherM95, author = {Kathleen Fisher and John C. Mitchell}, title = {The Development of Type Systems for Object-Oriented Languages}, journal = {Theory Pract. Object Syst.}, volume = {1}, number = {3}, pages = {189--220}, year = {1995}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tapos/FisherM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fct/FisherM95, author = {Kathleen Fisher and John C. Mitchell}, editor = {Horst Reichel}, title = {A Delegation-based Object Calculus with Subtying}, booktitle = {Fundamentals of Computation Theory, 10th International Symposium, {FCT} '95, Dresden, Germany, August 22-25, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {965}, pages = {42--61}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60249-6\_40}, doi = {10.1007/3-540-60249-6\_40}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fct/FisherM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/HoangM95, author = {My Hoang and John C. Mitchell}, editor = {Ron K. Cytron and Peter Lee}, title = {Lower Bounds on Type Inference with Subtypes}, booktitle = {Conference Record of POPL'95: 22nd {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, San Francisco, California, USA, January 23-25, 1995}, pages = {176--185}, publisher = {{ACM} Press}, year = {1995}, url = {https://doi.org/10.1145/199448.199481}, doi = {10.1145/199448.199481}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/HoangM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/CardelliMMS94, author = {Luca Cardelli and Simone Martini and John C. Mitchell and Andre Scedrov}, title = {An Extension of System {F} with Subtyping}, journal = {Inf. Comput.}, volume = {109}, number = {1/2}, pages = {4--56}, year = {1994}, url = {https://doi.org/10.1006/inco.1994.1013}, doi = {10.1006/INCO.1994.1013}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/CardelliMMS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/njc/FisherHM94, author = {Kathleen Fisher and Furio Honsell and John C. Mitchell}, title = {A lambda Calculus of Objects and Method Specialization}, journal = {Nord. J. Comput.}, volume = {1}, number = {1}, pages = {3--37}, year = {1994}, timestamp = {Wed, 14 Jan 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/njc/FisherHM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idl/KatiyarLM94, author = {Dinesh Katiyar and David C. Luckham and John C. Mitchell}, editor = {Jeannette M. Wing and Richard L. Wexelblat}, title = {Polymorphism and Subtyping in Interfaces}, booktitle = {Proceedings of the Workshop on Interface Definition Languages, January 20, 1994, Portland, Oregon, USA, in conjunction with {POPL} 1994}, pages = {22--34}, publisher = {{ACM} Press}, year = {1994}, url = {https://doi.org/10.1145/185084.185098}, doi = {10.1145/185084.185098}, timestamp = {Fri, 09 Jul 2021 14:03:46 +0200}, biburl = {https://dblp.org/rec/conf/idl/KatiyarLM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/KatiyarLM94, author = {Dinesh Katiyar and David C. Luckham and John C. Mitchell}, editor = {Hans{-}Juergen Boehm and Bernard Lang and Daniel M. Yellin}, title = {A Type System for Prototyping Languages}, booktitle = {Conference Record of POPL'94: 21st {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, Portland, Oregon, USA, January 17-21, 1994}, pages = {138--150}, publisher = {{ACM} Press}, year = {1994}, url = {https://doi.org/10.1145/174675.177838}, doi = {10.1145/174675.177838}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/KatiyarLM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacs/FisherM94, author = {Kathleen Fisher and John C. Mitchell}, editor = {Masami Hagiya and John C. Mitchell}, title = {Notes on Typed Object-Oriented Programming}, booktitle = {Theoretical Aspects of Computer Software, International Conference {TACS} '94, Sendai, Japan, April 19-22, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {789}, pages = {844--885}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-57887-0\_128}, doi = {10.1007/3-540-57887-0\_128}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/tacs/FisherM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tacs/1994, editor = {Masami Hagiya and John C. Mitchell}, title = {Theoretical Aspects of Computer Software, International Conference {TACS} '94, Sendai, Japan, April 19-22, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {789}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-57887-0}, doi = {10.1007/3-540-57887-0}, isbn = {3-540-57887-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tacs/1994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/JategaonkarM93, author = {Lalita Jategaonkar and John C. Mitchell}, title = {Type Inference with Extended Pattern Matching and Subtypes}, journal = {Fundam. Informaticae}, volume = {19}, number = {1/2}, pages = {127--165}, year = {1993}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/JategaonkarM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/Mitchell93, author = {John C. Mitchell}, title = {On Abstraction and the Expressive Power of Programming Languages}, journal = {Sci. Comput. Program.}, volume = {21}, number = {2}, pages = {141--163}, year = {1993}, url = {https://doi.org/10.1016/0167-6423(93)90004-9}, doi = {10.1016/0167-6423(93)90004-9}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/Mitchell93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/HarperM93, author = {Robert Harper and John C. Mitchell}, title = {On the Type Structure of Standard {ML}}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {15}, number = {2}, pages = {211--252}, year = {1993}, url = {https://doi.org/10.1145/169701.169696}, doi = {10.1145/169701.169696}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/HarperM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/HoangMV93, author = {My Hoang and John C. Mitchell and Ramesh Viswanathan}, title = {Standard {ML-NJ} weak polymorphism and imperative constructs}, booktitle = {Proceedings of the Eighth Annual Symposium on Logic in Computer Science {(LICS} '93), Montreal, Canada, June 19-23, 1993}, pages = {15--25}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/LICS.1993.287604}, doi = {10.1109/LICS.1993.287604}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/HoangMV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/MitchellHF93, author = {John C. Mitchell and Furio Honsell and Kathleen Fisher}, title = {A lambda calculus of objects and method specialization}, booktitle = {Proceedings of the Eighth Annual Symposium on Logic in Computer Science {(LICS} '93), Montreal, Canada, June 19-23, 1993}, pages = {26--38}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/LICS.1993.287603}, doi = {10.1109/LICS.1993.287603}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/MitchellHF93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apal/LincolnMSS92, author = {Patrick Lincoln and John C. Mitchell and Andre Scedrov and Natarajan Shankar}, title = {Decision Problems for Propositional Linear Logic}, journal = {Ann. Pure Appl. Log.}, volume = {56}, number = {1-3}, pages = {239--311}, year = {1992}, url = {https://doi.org/10.1016/0168-0072(92)90075-B}, doi = {10.1016/0168-0072(92)90075-B}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apal/LincolnMSS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/MitchellS92, author = {John C. Mitchell and Andre Scedrov}, editor = {Egon B{\"{o}}rger and Gerhard J{\"{a}}ger and Hans Kleine B{\"{u}}ning and Simone Martini and Michael M. Richter}, title = {Notes on Sconing and Relators}, booktitle = {Computer Science Logic, 6th Workshop, {CSL} '92, San Miniato, Italy, September 28 - October 2, 1992, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {702}, pages = {352--378}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-56992-8\_21}, doi = {10.1007/3-540-56992-8\_21}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/csl/MitchellS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/LincolnM92, author = {Patrick Lincoln and John C. Mitchell}, title = {Operational aspects of linear lambda calculus}, booktitle = {Proceedings of the Seventh Annual Symposium on Logic in Computer Science {(LICS} '92), Santa Cruz, California, USA, June 22-25, 1992}, pages = {235--246}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/LICS.1992.185536}, doi = {10.1109/LICS.1992.185536}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/LincolnM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/LincolnM92, author = {Patrick Lincoln and John C. Mitchell}, editor = {Ravi Sethi}, title = {Algorithmic Aspects of Type Inference with Subtypes}, booktitle = {Conference Record of the Nineteenth Annual {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, Albuquerque, New Mexico, USA, January 19-22, 1992}, pages = {293--304}, publisher = {{ACM} Press}, year = {1992}, url = {https://doi.org/10.1145/143165.143227}, doi = {10.1145/143165.143227}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/LincolnM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/BruceM92, author = {Kim B. Bruce and John C. Mitchell}, editor = {Ravi Sethi}, title = {{PER} Models of Subtyping, Recursive Types and Higher-Order Polymorphism}, booktitle = {Conference Record of the Nineteenth Annual {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, Albuquerque, New Mexico, USA, January 19-22, 1992}, pages = {316--327}, publisher = {{ACM} Press}, year = {1992}, url = {https://doi.org/10.1145/143165.143230}, doi = {10.1145/143165.143230}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/BruceM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apal/MitchellM91, author = {John C. Mitchell and Eugenio Moggi}, title = {Kripke-Style Models for Typed lambda Calculus}, journal = {Ann. Pure Appl. Log.}, volume = {51}, number = {1-2}, pages = {99--124}, year = {1991}, url = {https://doi.org/10.1016/0168-0072(91)90067-V}, doi = {10.1016/0168-0072(91)90067-V}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apal/MitchellM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/Mitchell91, author = {John C. Mitchell}, title = {Type Inference With Simple Subtypes}, journal = {J. Funct. Program.}, volume = {1}, number = {3}, pages = {245--285}, year = {1991}, url = {https://doi.org/10.1017/S0956796800000113}, doi = {10.1017/S0956796800000113}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/Mitchell91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mscs/CardelliM91, author = {Luca Cardelli and John C. Mitchell}, title = {Operations on Records}, journal = {Math. Struct. Comput. Sci.}, volume = {1}, number = {1}, pages = {3--48}, year = {1991}, url = {https://doi.org/10.1017/S0960129500000049}, doi = {10.1017/S0960129500000049}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mscs/CardelliM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Mitchell91, author = {John C. Mitchell}, editor = {Vladimir Lifschitz}, title = {On the Equivalence of Data Representations}, booktitle = {Artificial and Mathematical Theory of Computation, Papers in Honor of John McCarthy on the occasion of his sixty-fourth birthday}, pages = {305--329}, publisher = {Academic Press / Elsevier}, year = {1991}, url = {https://doi.org/10.1016/b978-0-12-450010-5.50023-2}, doi = {10.1016/B978-0-12-450010-5.50023-2}, timestamp = {Wed, 26 Jun 2019 13:52:03 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Mitchell91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/KanellakisMM91, author = {Paris C. Kanellakis and Harry G. Mairson and John C. Mitchell}, editor = {Jean{-}Louis Lassez and Gordon D. Plotkin}, title = {Unification and ML-Type Reconstruction}, booktitle = {Computational Logic - Essays in Honor of Alan Robinson}, pages = {444--478}, publisher = {The {MIT} Press}, year = {1991}, timestamp = {Wed, 30 Mar 2016 17:34:58 +0200}, biburl = {https://dblp.org/rec/conf/birthday/KanellakisMM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/constructivity/KurtzMO91, author = {Stuart A. Kurtz and John C. Mitchell and Michael J. O'Donnell}, editor = {J. Paul Myers Jr. and Michael J. O'Donnell}, title = {Connecting Formal Semantics to Constructive Intuitions}, booktitle = {Constructivity in Computer Science, Summer Symposium, San Antonio, Texas, USA, June 19-22, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {613}, pages = {1--21}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/BFb0021079}, doi = {10.1007/BFB0021079}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/constructivity/KurtzMO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/MitchellMM91, author = {John C. Mitchell and Sigurd Meldal and Neel Madhav}, editor = {David S. Wise}, title = {An Extension of Standard {ML} Modules with Subtyping and Inheritance}, booktitle = {Conference Record of the Eighteenth Annual {ACM} Symposium on Principles of Programming Languages, Orlando, Florida, USA, January 21-23, 1991}, pages = {270--278}, publisher = {{ACM} Press}, year = {1991}, url = {https://doi.org/10.1145/99583.99620}, doi = {10.1145/99583.99620}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/MitchellMM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacs/Mitchell91, author = {John C. Mitchell}, editor = {Takayasu Ito and Albert R. Meyer}, title = {On Abstraction and the Expressive Power of Programming Languages}, booktitle = {Theoretical Aspects of Computer Software, International Conference {TACS} '91, Sendai, Japan, September 24-27, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {526}, pages = {290--310}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54415-1\_51}, doi = {10.1007/3-540-54415-1\_51}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/tacs/Mitchell91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacs/CardelliMMS91, author = {Luca Cardelli and Simone Martini and John C. Mitchell and Andre Scedrov}, editor = {Takayasu Ito and Albert R. Meyer}, title = {An Extension of System {F} with Subtyping}, booktitle = {Theoretical Aspects of Computer Software, International Conference {TACS} '91, Sendai, Japan, September 24-27, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {526}, pages = {750--770}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54415-1\_73}, doi = {10.1007/3-540-54415-1\_73}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tacs/CardelliMMS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BruceMM90, author = {Kim B. Bruce and Albert R. Meyer and John C. Mitchell}, title = {The Semantics of Second-Order Lambda Calculus}, journal = {Inf. Comput.}, volume = {85}, number = {1}, pages = {76--134}, year = {1990}, url = {https://doi.org/10.1016/0890-5401(90)90044-I}, doi = {10.1016/0890-5401(90)90044-I}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/BruceMM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/LincolnMSS90, author = {Patrick Lincoln and John C. Mitchell and Andre Scedrov and Natarajan Shankar}, title = {Decision Problems for Propositional Linear Logic}, booktitle = {31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, October 22-24, 1990, Volume {II}}, pages = {662--671}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/FSCS.1990.89588}, doi = {10.1109/FSCS.1990.89588}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/LincolnMSS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lfp/HowardM90, author = {Brian T. Howard and John C. Mitchell}, editor = {Gilles Kahn}, title = {Operational and Axiomatic Semantics of {PCF}}, booktitle = {Proceedings of the 1990 {ACM} Conference on {LISP} and Functional Programming, {LFP} 1990, Nice, France, 27-29 June 1990}, pages = {298--306}, publisher = {{ACM}}, year = {1990}, url = {https://doi.org/10.1145/91556.91677}, doi = {10.1145/91556.91677}, timestamp = {Fri, 06 Aug 2021 15:08:55 +0200}, biburl = {https://dblp.org/rec/conf/lfp/HowardM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/Mitchell90, author = {John C. Mitchell}, editor = {Frances E. Allen}, title = {Toward a Typed Foundation for Method Specialization and Inheritance}, booktitle = {Conference Record of the Seventeenth Annual {ACM} Symposium on Principles of Programming Languages, San Francisco, California, USA, January 1990}, pages = {109--124}, publisher = {{ACM} Press}, year = {1990}, url = {https://doi.org/10.1145/96709.96719}, doi = {10.1145/96709.96719}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/Mitchell90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/HarperMM90, author = {Robert Harper and John C. Mitchell and Eugenio Moggi}, editor = {Frances E. Allen}, title = {Higher-Order Modules and the Phase Distinction}, booktitle = {Conference Record of the Seventeenth Annual {ACM} Symposium on Principles of Programming Languages, San Francisco, California, USA, January 1990}, pages = {341--354}, publisher = {{ACM} Press}, year = {1990}, url = {https://doi.org/10.1145/96709.96744}, doi = {10.1145/96709.96744}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/HarperMM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/leeuwen90/Mitchell90, author = {John C. Mitchell}, editor = {Jan van Leeuwen}, title = {Type Systems for Programming Languages}, booktitle = {Handbook of Theoretical Computer Science, Volume {B:} Formal Models and Semantics}, pages = {365--458}, publisher = {Elsevier and {MIT} Press}, year = {1990}, url = {https://doi.org/10.1016/b978-0-444-88074-1.50013-5}, doi = {10.1016/B978-0-444-88074-1.50013-5}, timestamp = {Tue, 06 Aug 2019 09:45:21 +0200}, biburl = {https://dblp.org/rec/books/el/leeuwen90/Mitchell90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctcs/CardelliM89, author = {Luca Cardelli and John C. Mitchell}, editor = {David H. Pitt and David E. Rydeheard and Peter Dybjer and Andrew M. Pitts and Axel Poign{\'{e}}}, title = {Operations in Records}, booktitle = {Category Theory and Computer Science, Manchester, UK, September 5-8, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {389}, pages = {75--81}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/BFb0018345}, doi = {10.1007/BFB0018345}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/ctcs/CardelliM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpca/CanningCHOM89, author = {Peter S. Canning and William R. Cook and Walter L. Hill and Walter G. Olthoff and John C. Mitchell}, editor = {Joseph E. Stoy}, title = {F-Bounded Polymorphism for Object-Oriented Programming}, booktitle = {Proceedings of the fourth international conference on Functional programming languages and computer architecture, {FPCA} 1989, London, UK, September 11-13, 1989}, pages = {273--280}, publisher = {{ACM}}, year = {1989}, url = {https://doi.org/10.1145/99370.99392}, doi = {10.1145/99370.99392}, timestamp = {Tue, 06 Nov 2018 11:07:48 +0100}, biburl = {https://dblp.org/rec/conf/fpca/CanningCHOM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfps/CardelliM89, author = {Luca Cardelli and John C. Mitchell}, editor = {Michael G. Main and Austin Melton and Michael W. Mislove and David A. Schmidt}, title = {Operations on Records}, booktitle = {Mathematical Foundations of Programming Semantics, 5th International Conference, Tulane University, New Orleans, Louisiana, USA, March 29 - April 1, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {442}, pages = {22--52}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/BFb0040253}, doi = {10.1007/BFB0040253}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/mfps/CardelliM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/KanellakisM89, author = {Paris C. Kanellakis and John C. Mitchell}, title = {Polymorphic Unification and {ML} Typing}, booktitle = {Conference Record of the Sixteenth Annual {ACM} Symposium on Principles of Programming Languages, Austin, Texas, USA, January 11-13, 1989}, pages = {105--115}, publisher = {{ACM} Press}, year = {1989}, url = {https://doi.org/10.1145/75277.75286}, doi = {10.1145/75277.75286}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/KanellakisM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Mitchell88, author = {John C. Mitchell}, title = {Polymorphic Type Inference and Containment}, journal = {Inf. Comput.}, volume = {76}, number = {2/3}, pages = {211--249}, year = {1988}, url = {https://doi.org/10.1016/0890-5401(88)90009-0}, doi = {10.1016/0890-5401(88)90009-0}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/Mitchell88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/MitchellP88, author = {John C. Mitchell and Gordon D. Plotkin}, title = {Abstract Types Have Existential Type}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {10}, number = {3}, pages = {470--502}, year = {1988}, url = {https://doi.org/10.1145/44501.45065}, doi = {10.1145/44501.45065}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/MitchellP88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lfp/JategaonkarM88, author = {Lalita Jategaonkar and John C. Mitchell}, editor = {J{\'{e}}r{\^{o}}me Chailloux}, title = {{ML} with Extended Pattern Matching and Subtypes}, booktitle = {Proceedings of the 1988 {ACM} Conference on {LISP} and Functional Programming, {LFP} 1988, Snowbird, Utah, USA, July 25-27, 1988}, pages = {198--211}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/62678.62702}, doi = {10.1145/62678.62702}, timestamp = {Fri, 06 Aug 2021 15:08:55 +0200}, biburl = {https://dblp.org/rec/conf/lfp/JategaonkarM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/MitchellH88, author = {John C. Mitchell and Robert Harper}, editor = {Jeanne Ferrante and Peter Mager}, title = {The Essence of {ML}}, booktitle = {Conference Record of the Fifteenth Annual {ACM} Symposium on Principles of Programming Languages, San Diego, California, USA, January 10-13, 1988}, pages = {28--46}, publisher = {{ACM} Press}, year = {1988}, url = {https://doi.org/10.1145/73560.73563}, doi = {10.1145/73560.73563}, timestamp = {Thu, 16 Sep 2021 11:02:28 +0200}, biburl = {https://dblp.org/rec/conf/popl/MitchellH88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/MitchellM87, author = {John C. Mitchell and Eugenio Moggi}, title = {Kripke-Style models for typed lambda calculus}, booktitle = {Proceedings of the Symposium on Logic in Computer Science {(LICS} '87), Ithaca, New York, USA, June 22-25, 1987}, pages = {303--314}, publisher = {{IEEE} Computer Society}, year = {1987}, timestamp = {Thu, 22 Jan 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/MitchellM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/MeyerMMS87, author = {Albert R. Meyer and John C. Mitchell and Eugenio Moggi and Richard Statman}, title = {Empty Types in Polymorphic Lambda Calculus}, booktitle = {Conference Record of the Fourteenth Annual {ACM} Symposium on Principles of Programming Languages, Munich, Germany, January 21-23, 1987}, pages = {253--262}, publisher = {{ACM} Press}, year = {1987}, url = {https://doi.org/10.1145/41625.41648}, doi = {10.1145/41625.41648}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/MeyerMMS87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lfp/Mitchell86, author = {John C. Mitchell}, editor = {William L. Scherlis and John H. Williams and Richard P. Gabriel}, title = {A Type-Inference Approach to Reduction Properties and Semantics of Polymorphic Expressions (Summary)}, booktitle = {Proceedings of the 1986 {ACM} Conference on {LISP} and Functional Programming, {LFP} 1986, Cambridge, Massachusetts, USA, August 4-6, 1986}, pages = {308--319}, publisher = {{ACM}}, year = {1986}, url = {https://doi.org/10.1145/319838.319872}, doi = {10.1145/319838.319872}, timestamp = {Fri, 06 Aug 2021 15:08:55 +0200}, biburl = {https://dblp.org/rec/conf/lfp/Mitchell86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/Mitchell86, author = {John C. Mitchell}, title = {Representation Independence and Data Abstraction}, booktitle = {Conference Record of the Thirteenth Annual {ACM} Symposium on Principles of Programming Languages, St. Petersburg Beach, Florida, USA, January 1986}, pages = {263--276}, publisher = {{ACM} Press}, year = {1986}, url = {https://doi.org/10.1145/512644.512669}, doi = {10.1145/512644.512669}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/Mitchell86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tark/MitchellO86, author = {John C. Mitchell and Michael J. O'Donnell}, editor = {Joseph Y. Halpern}, title = {Realisability Semantics for Error-Tolerant Logics}, booktitle = {Proceedings of the 1st Conference on Theoretical Aspects of Reasoning about Knowledge, Monterey, CA, USA, March 1986}, pages = {363--382}, publisher = {Morgan Kaufmann}, year = {1986}, timestamp = {Thu, 21 Jun 2018 07:50:24 +0200}, biburl = {https://dblp.org/rec/conf/tark/MitchellO86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lop/MitchellM85, author = {John C. Mitchell and Albert R. Meyer}, editor = {Rohit Parikh}, title = {Second-Order Logical Relations (Extended Abstract)}, booktitle = {Logics of Programs, Conference, Brooklyn College, New York, NY, USA, June 17-19, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {193}, pages = {225--236}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-15648-8\_18}, doi = {10.1007/3-540-15648-8\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/lop/MitchellM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/MitchellP85, author = {John C. Mitchell and Gordon D. Plotkin}, editor = {Mary S. Van Deusen and Zvi Galil and Brian K. Reid}, title = {Abstract Types Have Existential Type}, booktitle = {Conference Record of the Twelfth Annual {ACM} Symposium on Principles of Programming Languages, New Orleans, Louisiana, USA, January 1985}, pages = {37--51}, publisher = {{ACM} Press}, year = {1985}, url = {https://doi.org/10.1145/318593.318606}, doi = {10.1145/318593.318606}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/MitchellP85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ndltd/Mitchell84, author = {John C. Mitchell}, title = {Lambda calculus models of typed programming languages}, school = {Massachusetts Institute of Technology, Cambridge, MA, {USA}}, year = {1984}, url = {https://hdl.handle.net/1721.1/15394}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ndltd/Mitchell84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/DworkKM84, author = {Cynthia Dwork and Paris C. Kanellakis and John C. Mitchell}, title = {On the Sequential Nature of Unification}, journal = {J. Log. Program.}, volume = {1}, number = {1}, pages = {35--50}, year = {1984}, url = {https://doi.org/10.1016/0743-1066(84)90022-0}, doi = {10.1016/0743-1066(84)90022-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/DworkKM84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/Mitchell84, author = {John C. Mitchell}, title = {Semantic Models for Second-Order Lambda Calculus}, booktitle = {25th Annual Symposium on Foundations of Computer Science, West Palm Beach, Florida, USA, 24-26 October 1984}, pages = {289--299}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SFCS.1984.715927}, doi = {10.1109/SFCS.1984.715927}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/Mitchell84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/Mitchell84, author = {John C. Mitchell}, editor = {Ken Kennedy and Mary S. Van Deusen and Larry Landweber}, title = {Coercion and Type Inference}, booktitle = {Conference Record of the Eleventh Annual {ACM} Symposium on Principles of Programming Languages, Salt Lake City, Utah, USA, January 1984}, pages = {175--185}, publisher = {{ACM} Press}, year = {1984}, url = {https://doi.org/10.1145/800017.800529}, doi = {10.1145/800017.800529}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/Mitchell84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/MeyerM83, author = {Albert R. Meyer and John C. Mitchell}, title = {Termination Assertions for Recursive Programs: Completeness and Axiomatic Definability}, journal = {Inf. Control.}, volume = {56}, number = {1/2}, pages = {112--138}, year = {1983}, url = {https://doi.org/10.1016/S0019-9958(83)80053-9}, doi = {10.1016/S0019-9958(83)80053-9}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/MeyerM83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Mitchell83, author = {John C. Mitchell}, title = {The Implication Problem for Functional and Inclusion Dependencies}, journal = {Inf. Control.}, volume = {56}, number = {3}, pages = {154--173}, year = {1983}, url = {https://doi.org/10.1016/S0019-9958(83)80002-3}, doi = {10.1016/S0019-9958(83)80002-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/Mitchell83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pods/Mitchell83, author = {John C. Mitchell}, editor = {Ronald Fagin and Philip A. Bernstein}, title = {Inference Rules for Functional and Inclusion Dependencies}, booktitle = {Proceedings of the Second {ACM} {SIGACT-SIGMOD} Symposium on Principles of Database Systems, March 21-23, 1983, Colony Square Hotel, Atlanta, Georgia, {USA}}, pages = {58--69}, publisher = {{ACM}}, year = {1983}, url = {https://doi.org/10.1145/588058.588067}, doi = {10.1145/588058.588067}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pods/Mitchell83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/MeyerM82, author = {Albert R. Meyer and John C. Mitchell}, editor = {Richard A. DeMillo}, title = {Axiomatic Definability and Completeness for Recursive Programs}, booktitle = {Conference Record of the Ninth Annual {ACM} Symposium on Principles of Programming Languages, Albuquerque, New Mexico, USA, January 1982}, pages = {337--346}, publisher = {{ACM} Press}, year = {1982}, url = {https://doi.org/10.1145/582153.582188}, doi = {10.1145/582153.582188}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/MeyerM82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.