John Mitchell

Results: 387



#Item
1Software engineering / Computer programming / Computing / High-level programming languages / Functional languages / Cross-platform software / Scripting languages / JavaScript / Web programming / Scope / Eval / C Sharp

Run-Time Enforcement of Secure JavaScript Subsets Sergio Maffeis Imperial College London John C. Mitchell

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
2Data management / Computing / Data / Relational database management systems / Database theory / NoSQL / Structured storage / Database / NewSQL / Relational database / ODB / Conjunctive query

SoK: Cryptographically Protected Database Search Benjamin Fuller∗ , Mayank Varia† , Arkady Yerukhimovich‡ , Emily Shen‡ , Ariel Hamlin‡ , Vijay Gadepally‡ , Richard Shay‡ , John Darby Mitchell‡ , and Robe

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:55
3Computing / Computer programming / Software engineering / Functional languages / High-level programming languages / Computer access control / Object-capability model / JavaScript / Heap / Topological space / Monad / Caja project

Object Capabilities and Isolation of Untrusted Web Applications Sergio Maffeis Imperial College London John C. Mitchell Stanford University

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2010-03-08 04:28:13
4Cryptography / Computational hardness assumptions / Decisional DiffieHellman assumption / Computational DiffieHellman assumption / Decision Linear assumption / DiffieHellman problem / Learning with errors / Weight / Provable security / IP / XDH assumption / Ideal lattice cryptography

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

Add to Reading List

Source URL: eftychis.org

Language: English - Date: 2018-02-16 15:03:09
5

Analysis of the 802.11i 4-Way Handshake Changhua He John C Mitchell

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2004-08-10 06:08:32
    6

    Toward Principled Browser Security Edward Z. Yang, Deian Stefan, John C. Mitchell, David Mazières, Petr Marchenko, and Brad Karp Web security Non requirements

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2014-12-02 06:10:56
      7

      Programming Language Methods in Computer Security John Mitchell Stanford University

      Add to Reading List

      Source URL: theory.stanford.edu

      Language: English - Date: 2001-03-11 22:41:33
        8

        AUTOMATICALLY DERIVED SPOKEN LANGUAGE MARKERS FOR DETECTING MILD COGNITIVE IMPAIRMENT Brian Roark, John-Paul Hosom, Margaret Mitchell Jeffrey A. Kaye Center for Spoken Language Understanding Layton Aging & Alzheimer’s

        Add to Reading List

        Source URL: www.m-mitchell.com

        Language: English - Date: 2013-01-29 22:40:38
          9

          AUTOMATICALLY DERIVED SPOKEN LANGUAGE MARKERS FOR DETECTING MILD COGNITIVE IMPAIRMENT Brian Roark, John-Paul Hosom, Margaret Mitchell Jeffrey A. Kaye Center for Spoken Language Understanding Layton Aging & Alzheimer’s

          Add to Reading List

          Source URL: m-mitchell.com

          Language: English - Date: 2013-01-29 22:40:38
            10

            A Promising Direction for Web Tracking Countermeasures Jason Bau, Jonathan Mayer, Hristo Paskov and John C. Mitchell Stanford University Stanford, CA {jbau, jmayer, hpaskov, jcm}@stanford.edu

            Add to Reading List

            Source URL: jonathanmayer.org

            - Date: 2014-03-16 23:29:23
              UPDATE