John Mitchell

Results: 387



#Item
121Simple public key infrastructure / Access control / Logic in computer science / Programming language semantics / Access Control Matrix / Kernel / Architecture of Windows NT / Operational semantics / Logical access control / Security / Computer security / Key management

Reconstructing Trust Management Ajay Chander ∗ Drew Dean † John C. Mitchell∗

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-02-04 00:01:29
122Mandatory access control / HTTP cookie / Access control / Form / Database / JavaScript / Web application framework / Google Chrome / HTML / Computing / Software / Database management systems

Hails: Protecting Data Privacy in Untrusted Web Applications Daniel B. Giffin, Amit Levy, Deian Stefan David Terei, David Mazi`eres, John C. Mitchell Stanford Abstract

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2012-09-18 17:27:27
123Dependency theory / Latin / Lourdes Casanova / John Henry Coatsworth / Mitchell A. Seligson / Americas / Latin American studies / Latin America

University of Florida Department of Political Science Page 1 of 9 INR 4244 International Politics of Latin America

Add to Reading List

Source URL: polisci.ufl.edu

Language: English - Date: 2014-02-16 15:56:20
124Computing / Security / Policy / Identity management / Social issues / Privacy policy / Internet privacy / Computer security / Ethics / Enterprise Privacy Authorization Language / Privacy

Conflict and Combination in Privacy Policy Languages (Summary) Adam Barth John C. Mitchell

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-17 01:08:45
125Climate forcing / Intergovernmental Panel on Climate Change / Global warming / Computational science / Global climate model / Climate sensitivity / Climate model / Climate / IPCC Fourth Assessment Report / Atmospheric sciences / Climate change / Climatology

THE WCRP CMIP3 MULTIMODEL DATASET A New Era in Climate Change Research GERALD A. MEEHL, CURT COVEY, THOMAS DELWORTH, MOJIB L ATIF, BRYANT MCAVANEY, JOHN F. B. MITCHELL,

Add to Reading List

Source URL: www.wcrp-climate.org

Language: English - Date: 2013-12-03 05:34:09
126Ministry of Defence / Military / Special Air Service Regiment / Military capability

Published: 12 NovemberLaunch of Sir John Forrest Oration a Success for AIDN-WA By Mitchell Sutton AIDN-WA Correspondent

Add to Reading List

Source URL: files.groupspaces.com

Language: English
127Data / Kerberos / Needham–Schroeder protocol / Information / Cryptographic nonce / Cyberwarfare / Cryptographic protocols / Cryptography / Computer network security

Secrecy Analysis in Protocol Composition Logic Arnab ROY a , Anupam DATTA b , Ante DEREK c , John C. MITCHELL a , and Jean-Pierre SEIFERT d a Stanford University, USA

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-11-29 16:22:57
128Agronomy / Biological processes / Cellular respiration / Photosynthetically active radiation / Leaf Area Index / Canopy / C4 carbon fixation / C3 carbon fixation / Sunlight / Biology / Photosynthesis / Plant physiology

Discussion Paper Series No. 48 Designing rice for the 21st century: the three laws of maximum yield John E. Sheehy and P.L. Mitchell

Add to Reading List

Source URL: books.irri.org

Language: English - Date: 2013-05-31 01:29:00
129Advantage / Cryptographic protocol / Cipher / XTR / Cryptography / Ciphertext indistinguishability / Semantic security

Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:33:31
130Dolev-Yao model / Public-key cryptography / Protocol composition logic / XTR / Cryptographic primitive / Semantic security / Secure channel / Key-agreement protocol / Commitment scheme / Cryptography / Cryptographic protocols / Ciphertext indistinguishability

Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:37:13
UPDATE