John Mitchell

Results: 387



#Item
91Towards a Formal Foundation of Web Security Devdatta Akhawe∗ , Adam Barth∗ , Peifung E. Lam† , John Mitchell† and Dawn Song∗ ∗ University of California, Berkeley {devdatta,abarth,dawnsong}@cs.berkeley.edu †

Towards a Formal Foundation of Web Security Devdatta Akhawe∗ , Adam Barth∗ , Peifung E. Lam† , John Mitchell† and Dawn Song∗ ∗ University of California, Berkeley {devdatta,abarth,dawnsong}@cs.berkeley.edu †

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-05-02 17:49:28
92Security decision-making among interdependent organizations R. Ann Miura-Ko, Benjamin Yolken, John Mitchell, and Nicholas Bambos Stanford University Abstract In various settings, such as when customers use the same

Security decision-making among interdependent organizations R. Ann Miura-Ko, Benjamin Yolken, John Mitchell, and Nicholas Bambos Stanford University Abstract In various settings, such as when customers use the same

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 22:02:41
93Hon. Dr Denis Napthine MLA Minister for Ports, Major Projects, Racing, Regional Cities Speech delivered to SEGRA delegates, Tuesday 25 OctoberCould I acknowledge Councillor John Mitchell the Mayor of the City of G

Hon. Dr Denis Napthine MLA Minister for Ports, Major Projects, Racing, Regional Cities Speech delivered to SEGRA delegates, Tuesday 25 OctoberCould I acknowledge Councillor John Mitchell the Mayor of the City of G

Add to Reading List

Source URL: www.segra.com.au

Language: English - Date: 2011-12-13 18:33:31
94Featured In Hero  Through revenue received from Hero, The Secret Company is honored to contribute to the following foundations and charities of Hero’s contributors.  Michael Acton Smith

Featured In Hero Through revenue received from Hero, The Secret Company is honored to contribute to the following foundations and charities of Hero’s contributors. Michael Acton Smith

Add to Reading List

Source URL: images.thesecret.tv

Language: English - Date: 2015-03-02 14:27:55
95Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2004-05-03 19:17:14
96State of the Art: Automated Black-Box Web Application Vulnerability Testing Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell Stanford University Stanford, CA {jbau, divijg}@stanford.edu, {elie, mitchell}@cs.stanford

State of the Art: Automated Black-Box Web Application Vulnerability Testing Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell Stanford University Stanford, CA {jbau, divijg}@stanford.edu, {elie, mitchell}@cs.stanford

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 17:31:25
97Datalog with Constraints: A Foundation for Trust Management Languages Ninghui Li and John C. Mitchell Department of Computer Science, Stanford University Gates 4B, Stanford, CA {ninghui.li, jcm}@cs.stanford.ed

Datalog with Constraints: A Foundation for Trust Management Languages Ninghui Li and John C. Mitchell Department of Computer Science, Stanford University Gates 4B, Stanford, CA {ninghui.li, jcm}@cs.stanford.ed

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2002-11-05 19:04:46
98EXTRACTS FROM THE DIARIES OF JOHN PIDCOCK (HARRY) MASON MITCHELL LIBRARY MSS 74 Despite his given names, Mason appears to have been known as Harry. The Mitchell Library has four versions of his Diary: Item 5

EXTRACTS FROM THE DIARIES OF JOHN PIDCOCK (HARRY) MASON MITCHELL LIBRARY MSS 74 Despite his given names, Mason appears to have been known as Harry. The Mitchell Library has four versions of his Diary: Item 5

Add to Reading List

Source URL: notapoormansfield.com

Language: English - Date: 2010-05-13 12:52:51
    99Compositional Analysis of Contract Signing Protocols Michael Backes a , Anupam Datta b , Ante Derek b , John C. Mitchell b and Mathieu Turuani c a Saarland

    Compositional Analysis of Contract Signing Protocols Michael Backes a , Anupam Datta b , Ante Derek b , John C. Mitchell b and Mathieu Turuani c a Saarland

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2007-12-18 01:01:14
    100Client-side defense against web-based identity theft Neil Chou Robert Ledesma Yuka Teraguchi John C. Mitchell Computer Science Department, Stanford University, Stanford CA 94305 {neilchou, led242, yukat, jcm}@stanford.ed

    Client-side defense against web-based identity theft Neil Chou Robert Ledesma Yuka Teraguchi John C. Mitchell Computer Science Department, Stanford University, Stanford CA 94305 {neilchou, led242, yukat, jcm}@stanford.ed

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2003-11-24 14:01:52