John Mitchell

Results: 387



#Item
101Towards a user-centred method for studying CVLEs Daphne Economou, William L. Mitchell and Tom Boyle* Department of Computing and Mathematics, Manchester Metropolitan University, John Dalton Building, Chester Street, Manc

Towards a user-centred method for studying CVLEs Daphne Economou, William L. Mitchell and Tom Boyle* Department of Computing and Mathematics, Manchester Metropolitan University, John Dalton Building, Chester Street, Manc

Add to Reading List

Source URL: ui4all.ics.forth.gr

Language: English - Date: 2007-11-27 14:01:51
102Object Capabilities and Isolation of Untrusted Web Applications Sergio Maffeis Imperial College London John C. Mitchell Stanford University

Object Capabilities and Isolation of Untrusted Web Applications Sergio Maffeis Imperial College London John C. Mitchell Stanford University

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 17:40:17
103RT : A Role-based Trust-management Framework∗ Ninghui Li John C. Mitchell Department of Computer Science, Stanford University Gates 4B, Stanford, CA {ninghui.li, mitchell}@cs.stanford.edu

RT : A Role-based Trust-management Framework∗ Ninghui Li John C. Mitchell Department of Computer Science, Stanford University Gates 4B, Stanford, CA {ninghui.li, mitchell}@cs.stanford.edu

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-11-04 15:32:03
104Run-Time Enforcement of Secure JavaScript Subsets Sergio Maffeis Imperial College London   John C. Mitchell

Run-Time Enforcement of Secure JavaScript Subsets Sergio Maffeis Imperial College London John C. Mitchell

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2009-06-18 11:30:20
105Beyond Proof-of-compliance: Security Analysis in Trust Management NINGHUI LI Purdue University JOHN C. MITCHELL Stanford University

Beyond Proof-of-compliance: Security Analysis in Trust Management NINGHUI LI Purdue University JOHN C. MITCHELL Stanford University

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-17 01:15:33
106Privacy and Contextual Integrity: Framework and Applications Adam Barth Anupam Datta John C. Mitchell Stanford University

Privacy and Contextual Integrity: Framework and Applications Adam Barth Anupam Datta John C. Mitchell Stanford University

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-17 00:58:55
107WMAC-2 report	 
 John Mitchell and Christian Jakob WMAC Co-Chairs

WMAC-2 report John Mitchell and Christian Jakob WMAC Co-Chairs

Add to Reading List

Source URL: www.wcrp-climate.org

Language: English - Date: 2013-07-04 10:08:22
108How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation  Elie Bursztein, Steven Bethard, Celine Fabry, John C. Mitchell, Dan Jurafsky , , , mitchell@

How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation Elie Bursztein, Steven Bethard, Celine Fabry, John C. Mitchell, Dan Jurafsky , , , mitchell@

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 17:30:39
109Privacy and Contextual Integrity: Framework and Applications Adam Barth Anupam Datta John C. Mitchell Stanford University

Privacy and Contextual Integrity: Framework and Applications Adam Barth Anupam Datta John C. Mitchell Stanford University

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2015-04-16 18:44:09
110Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University  Abstract. Protocol authentication properties are generally

Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-27 15:51:40