


default search action
John C. Mitchell
Person information
- affiliation: Stanford University, Department of Computer Science, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c174]Ishita Gupta
, Maya Bridgman
, Sierra Wang
, John C. Mitchell
:
Coding Pathfinder: A Platform for Creative, Self-Guided Mastery in Programming. SIGCSE (2) 2025: 1465-1466 - [i32]Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel:
Analyzing and Exploiting Branch Mispredictions in Microcode. CoRR abs/2501.12890 (2025) - 2024
- [j53]René F. Kizilcec
, John C. Mitchell
:
Remote Learning and Work. IEEE Internet Comput. 28(1): 7-9 (2024) - [c173]Yue Huang, Lichao Sun, Haoran Wang, Siyuan Wu, Qihui Zhang, Yuan Li, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Hanchi Sun, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bertie Vidgen, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, Joaquin Vanschoren, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yong Chen, Yue Zhao:
Position: TrustLLM: Trustworthiness in Large Language Models. ICML 2024 - [c172]John C. Mitchell, Abbas A. Dehghani-Sanij, Shengquan Xie, Rory J. O'Connor
:
Machine Learning Techniques for Context-Aware Human Activity Recognition: A Feasibility Study. M2VIP 2024: 1-6 - [c171]Sierra Wang
, John C. Mitchell
, Chris Piech
:
A Large Scale RCT on Effective Error Messages in CS1. SIGCSE (1) 2024: 1395-1401 - [c170]Sierra Wang
, John C. Mitchell
, Nick Haber
, Chris Piech
:
Math IDE: A Platform for Creating with Math. SIGCSE (2) 2024: 1844-1845 - [c169]Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel:
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time. SP 2024: 4200-4219 - [d1]John C. Mitchell, Abbas A. Dehghani-Sanij, Sheng Quan Xie, Rory J. O'Connor:
Context-Aware Human Activity Recognition (CAHAR) Dataset. IEEE DataPort, 2024 - [i31]Lichao Sun, Yue Huang, Haoran Wang, Siyuan Wu, Qihui Zhang, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yue Zhao:
TrustLLM: Trustworthiness in Large Language Models. CoRR abs/2401.05561 (2024) - [i30]Sanjari Srivastava, Piotr Mardziel, Zhikhun Zhang, Archana Ahlawat, Anupam Datta, John C. Mitchell:
De-amplifying Bias from Differential Privacy in Language Model Fine-tuning. CoRR abs/2402.04489 (2024) - [i29]Diyi Yang, Caleb Ziems, William Held, Omar Shaikh, Michael S. Bernstein, John C. Mitchell:
Social Skill Training with Large Language Models. CoRR abs/2404.04204 (2024) - [i28]Mihai Christodorescu, Ryan Craven, Soheil Feizi, Neil Gong, Mia Hoffmann, Somesh Jha, Zhengyuan Jiang, Mehrdad Saberi Kamarposhti, John C. Mitchell, Jessica Newman, Emelia Probasco, Yanjun Qi, Khawaja Shams, Matthew Turek:
Securing the Future of GenAI: Policy and Technology. CoRR abs/2407.12999 (2024) - [i27]Benjamin Klieger, Charis Charitsis, Miroslav Suzara, Sierra Wang, Nick Haber, John C. Mitchell:
ChatCollab: Exploring Collaboration Between Humans and AI Agents in Software Teams. CoRR abs/2412.01992 (2024) - [i26]Mihai Christodorescu, Ryan Craven, Soheil Feizi, Neil Zhenqiang Gong, Mia Hoffmann, Somesh Jha, Zhengyuan Jiang, Mehrdad Saberi Kamarposhti, John C. Mitchell, Jessica Newman, Emelia Probasco, Yanjun Qi, Khawaja Shams, Matthew Turek:
Securing the Future of GenAI: Policy and Technology. IACR Cryptol. ePrint Arch. 2024: 855 (2024) - 2023
- [j52]Clark W. Barrett, Brad Boyd, Elie Bursztein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang
, Florian Kerschbaum, Eric Mitchell, John C. Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang:
Identifying and Mitigating the Security Risks of Generative AI. Found. Trends Priv. Secur. 6(1): 1-52 (2023) - [c168]Charis Charitsis
, Chris Piech
, John C. Mitchell
:
Detecting the Reasons for Program Decomposition in CS1 and Evaluating Their Impact. SIGCSE (1) 2023: 1014-1020 - [i25]Clark W. Barrett, Brad Boyd, Ellie Burzstein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang, Florian Kerschbaum, Eric Mitchell, John C. Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang:
Identifying and Mitigating the Security Risks of Generative AI. CoRR abs/2308.14840 (2023) - [i24]Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel:
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time. CoRR abs/2309.05174 (2023) - 2022
- [c167]Charis Charitsis, Chris Piech, John C. Mitchell
:
Function Names: Quantifying the Relationship Between Identifiers and Their Functionality to Improve Them. L@S 2022: 93-101 - [c166]Charis Charitsis, Chris Piech, John C. Mitchell
:
Using NLP to Quantify Program Decomposition in CS1. L@S 2022: 113-120 - [c165]Charis Charitsis, Chris Piech, John C. Mitchell
:
Feedback on Program Development Process for CS1 Students. SIGCSE (2) 2022: 1150 - [i23]Maxwell Bigman, Yosefa Gilon, Jenny Han, John C. Mitchell:
Insights for post-pandemic pedagogy across one CS department. CoRR abs/2203.09050 (2022) - [i22]Sam Blackshear, John C. Mitchell, Todd Nowacki, Shaz Qadeer:
The Move Borrow Checker. CoRR abs/2205.05181 (2022) - 2021
- [c164]Charis Charitsis, Chris Piech, John C. Mitchell
:
Simplifying Automated Assessment in CS1. ICETM 2021: 226-231 - [c163]Charis Charitsis, Chris Piech, John C. Mitchell
:
Assessing Function Names and Quantifying the Relationship Between Identifiers and Their Functionality to Improve Them. L@S 2021: 291-294 - 2020
- [c162]Max DiGiacomo-Castillo, Yiyun Liang, Advay Pal, John C. Mitchell
:
Model Checking Bitcoin and other Proof-of-Work Consensus Protocols. Blockchain 2020: 351-358 - [c161]Jonathan Bassen, Bharathan Balaji, Michael Schaarschmidt, Candace Thille, Jay Painter, Dawn Zimmaro, Alex Games, Ethan Fast, John C. Mitchell
:
Reinforcement Learning for the Adaptive Scheduling of Educational Activities. CHI 2020: 1-12 - [c160]Maxwell Bigman, John C. Mitchell:
Teaching Online in 2020: Experiments, Empathy, Discovery. LWMOOCS 2020: 156-161 - [i21]Sam Blackshear, David L. Dill, Shaz Qadeer, Clark W. Barrett, John C. Mitchell, Oded Padon, Yoni Zohar:
Resources: A Safe Language Abstraction for Money. CoRR abs/2004.05106 (2020) - [i20]Max DiGiacomo-Castillo, Yiyun Liang, Advay Pal, John C. Mitchell:
Model Checking Bitcoin and other Proof-of-Work Consensus Protocols. CoRR abs/2007.08644 (2020)
2010 – 2019
- 2019
- [j51]Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell
, Andre Scedrov, Benedikt Schmidt:
Automated Analysis of Cryptographic Assumptions in Generic Group Models. J. Cryptol. 32(2): 324-360 (2019) - 2018
- [c159]Avradip Mandal, John C. Mitchell
, Hart Montgomery, Arnab Roy:
Data Oblivious Genome Variants Search on Intel SGX. DPM/CBT@ESORICS 2018: 296-310 - [c158]Jonathan Bassen, Iris Howley, Ethan Fast, John C. Mitchell, Candace Thille:
OARS: exploring instructor analytics for online learning. L@S 2018: 55:1-55:10 - [i19]Eftychios Theodorakis, John C. Mitchell:
Semantic Security Invariance under Variant Computational Assumptions. IACR Cryptol. ePrint Arch. 2018: 51 (2018) - [i18]Avradip Mandal, John C. Mitchell, Hart Montgomery, Arnab Roy:
Data Oblivious Genome Variants Search on Intel SGX. IACR Cryptol. ePrint Arch. 2018: 732 (2018) - 2017
- [j50]Daniel B. Giffin, Amit Levy
, Deian Stefan, David Terei, David Mazières, John C. Mitchell
, Alejandro Russo
:
Hails: Protecting data privacy in untrusted web applications. J. Comput. Secur. 25(4-5): 427-461 (2017) - [j49]Deian Stefan, David Mazières, John C. Mitchell
, Alejandro Russo
:
Flexible dynamic information flow control in the presence of exceptions. J. Funct. Program. 27: e5 (2017) - [c157]Avradip Mandal, John C. Mitchell, Hart William Montgomery, Arnab Roy:
Privacy for targeted advertising. CNS 2017: 438-443 - [i17]Avradip Mandal, John C. Mitchell, Hart William Montgomery, Arnab Roy:
Privacy for Targeted Advertising. IACR Cryptol. ePrint Arch. 2017: 658 (2017) - 2016
- [j48]Jonathan R. Mayer, Patrick Mutchler, John C. Mitchell
:
Evaluating the privacy properties of telephone metadata. Proc. Natl. Acad. Sci. USA 113(20): 5536-5541 (2016) - [c156]David J. Wu, Joe Zimmerman, Jérémy Planul, John C. Mitchell:
Privacy-Preserving Shortest Path Computation. NDSS 2016 - [c155]Patrick Mutchler, Yeganeh Safaei, Adam Doupé, John C. Mitchell
:
Target Fragmentation in Android Apps. IEEE Symposium on Security and Privacy Workshops 2016: 204-213 - [c154]Hristo S. Paskov, John C. Mitchell, Trevor J. Hastie:
Data Representation and Compression Using Linear-Programming Approximations. ICLR (Poster) 2016 - [i16]David J. Wu, Joe Zimmerman, Jérémy Planul, John C. Mitchell:
Privacy-Preserving Shortest Path Computation. CoRR abs/1601.02281 (2016) - 2015
- [c153]Stefan Heule, Deian Stefan, Edward Z. Yang, John C. Mitchell, Alejandro Russo
:
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control. POST 2015: 11-31 - [c152]Hristo S. Paskov, John C. Mitchell, Trevor J. Hastie:
Fast Algorithms for Learning with Long N-grams via Suffix Tree Based Matrix Multiplication. UAI 2015: 672-681 - [i15]Stefan Heule, Deian Stefan, Edward Z. Yang, John C. Mitchell, Alejandro Russo:
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control (Extended Version). CoRR abs/1501.04132 (2015) - [i14]Anupam Datta, Joseph Y. Halpern, John C. Mitchell, Arnab Roy, Shayak Sen:
A Symbolic Logic with Concrete Bounds for Cryptographic Protocols. CoRR abs/1511.07536 (2015) - 2014
- [j47]Pierre Dillenbourg, Armando Fox, Claude Kirchner, John C. Mitchell, Martin Wirsing:
Massive Open Online Courses: Current State and Perspectives (Dagstuhl Perspectives Workshop 14112). Dagstuhl Manifestos 4(1): 1-27 (2014) - [j46]John C. Mitchell:
MOOCs on and off the Farm: MOOCs and technology to advance learning and learning research (Ubiquity symposium). Ubiquity 2014(June): 1:1-1:10 (2014) - [c151]Hristo S. Paskov, John C. Mitchell, Trevor J. Hastie:
An Efficient Algorithm for Large Scale Compressive Feature Learning. AISTATS 2014: 760-768 - [c150]Elie Bursztein, Angelique Moscicki, Celine Fabry, Steven Bethard, John C. Mitchell, Dan Jurafsky:
Easy does it: more usable CAPTCHAs. CHI 2014: 2637-2646 - [c149]Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov
, Benedikt Schmidt:
Automated Analysis of Cryptographic Assumptions in Generic Group Models. CRYPTO (1) 2014: 95-112 - [c148]John C. Mitchell, Joe Zimmerman:
Data-Oblivious Data Structures. STACS 2014: 554-565 - [c147]Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. Mitchell:
The End is Nigh: Generic Solving of Text-based CAPTCHAs. WOOT 2014 - [i13]Pierre Dillenbourg, Claude Kirchner, John C. Mitchell, Martin Wirsing:
Massively Open Online Courses, Current State and Perspectives (Dagstuhl Perspectives Workshop 14112). Dagstuhl Reports 4(3): 47-61 (2014) - [i12]Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt:
Automated Analysis of Cryptographic Assumptions in Generic Group Models. IACR Cryptol. ePrint Arch. 2014: 458 (2014) - 2013
- [c146]Jérémy Planul, John C. Mitchell
:
Oblivious Program Execution and Path-Sensitive Non-interference. CSF 2013: 66-80 - [c145]Edward Z. Yang, Deian Stefan, John C. Mitchell, David Mazières, Petr Marchenko, Brad Karp:
Toward Principled Browser Security. HotOS 2013 - [c144]Hristo S. Paskov, Robert West, John C. Mitchell, Trevor J. Hastie:
Compressive Feature Learning. NIPS 2013: 2931-2939 - [c143]Ellick Chan, Peifung E. Lam, John C. Mitchell:
Understanding the Challenges with Medical Data Segmentation for Privacy. HealthTech 2013 - [e6]David A. Basin, John C. Mitchell:
Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Lecture Notes in Computer Science 7796, Springer 2013, ISBN 978-3-642-36829-5 [contents] - 2012
- [j45]Carl E. Landwehr, Dan Boneh, John C. Mitchell
, Steven M. Bellovin, Susan Landau, Michael E. Lesk:
Privacy and Cybersecurity: The Next 100 Years. Proc. IEEE 100(Centennial-Issue): 1659-1673 (2012) - [j44]Adam Barth, Benjamin I. P. Rubinstein
, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett
:
A Learning-Based Approach to Reactive Security. IEEE Trans. Dependable Secur. Comput. 9(4): 482-493 (2012) - [c142]John C. Mitchell
, Rahul Sharma, Deian Stefan, Joe Zimmerman:
Information-Flow Control for Programming on Encrypted Data. CSF 2012: 45-60 - [c141]Deian Stefan, Alejandro Russo
, Pablo Buiras, Amit Levy
, John C. Mitchell
, David Mazières:
Addressing covert termination and timing channels in concurrent information flow systems. ICFP 2012: 201-214 - [c140]Peifung E. Lam, John C. Mitchell, Andre Scedrov
, Sharada Sundaram, Frank Wang:
Declarative privacy policy: finite models and attribute-based encryption. IHI 2012: 323-332 - [c139]Daniel B. Giffin, Amit Levy, Deian Stefan, David Terei, David Mazières, John C. Mitchell, Alejandro Russo:
Hails: Protecting Data Privacy in Untrusted Web Applications. OSDI 2012: 47-60 - [c138]Jonathan R. Mayer, John C. Mitchell
:
Third-Party Web Tracking: Policy and Technology. IEEE Symposium on Security and Privacy 2012: 413-427 - [c137]Elie Bursztein, Chinmay Soman, Dan Boneh, John C. Mitchell:
SessionJuggler: secure web login from an untrusted terminal using session hijacking. WWW 2012: 321-330 - [i11]Deian Stefan, Alejandro Russo, John C. Mitchell, David Mazières:
Flexible Dynamic Information Flow Control in the Presence of Exceptions. CoRR abs/1207.1457 (2012) - [i10]John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman:
Information-flow control for programming on encrypted data. IACR Cryptol. ePrint Arch. 2012: 205 (2012) - 2011
- [j43]Jason Bau, John C. Mitchell
:
Security Modeling and Analysis. IEEE Secur. Priv. 9(3): 18-25 (2011) - [c136]Elie Bursztein, Matthieu Martin, John C. Mitchell:
Text-based CAPTCHA strengths and weaknesses. CCS 2011: 125-138 - [c135]Elie Bursztein, Baptiste Gourdin, John C. Mitchell:
Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs. ESORICS 2011: 133-149 - [c134]Alex Bain, John C. Mitchell
, Rahul Sharma, Deian Stefan, Joe Zimmerman:
A Domain-Specific Language for Computing on Encrypted Data (Invited Talk). FSTTCS 2011: 6-24 - [c133]Deian Stefan, Alejandro Russo
, John C. Mitchell
, David Mazières:
Flexible dynamic information flow control in Haskell. Haskell 2011: 95-106 - [c132]Timothy L. Hinrichs, William C. Garrison III, Adam J. Lee, Skip Saunders, John C. Mitchell:
TBA : A Hybrid of Logic and Extensional Access Control Systems. Formal Aspects in Security and Trust 2011: 198-213 - [c131]Deian Stefan, Alejandro Russo
, David Mazières, John C. Mitchell:
Disjunction Category Labels. NordSec 2011: 223-239 - [c130]John C. Mitchell:
Program Analysis for Web Security. SAS 2011: 4 - [c129]Elie Bursztein, Romain Beauxis, Hristo S. Paskov, Daniele Perito, Celine Fabry, John C. Mitchell
:
The Failure of Noise-Based Non-continuous Audio Captchas. IEEE Symposium on Security and Privacy 2011: 19-31 - [c128]Ankur Taly, Úlfar Erlingsson, John C. Mitchell
, Mark S. Miller, Jasvir Nagra:
Automated Analysis of Security-Critical JavaScript APIs. IEEE Symposium on Security and Privacy 2011: 363-378 - [c127]John C. Mitchell:
A Symbolic Logic with Exact Bounds for Cryptographic Protocols. WoLLIC 2011: 3 - [p3]Anupam Datta, John C. Mitchell, Arnab Roy, Stephan Hyeonjun Stiller:
Protocol Composition Logic. Formal Models and Techniques for Analyzing Security Protocols 2011: 182-221 - [i9]Alex Bain, John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman:
A Domain-Specific Language for Computing on Encrypted Data. IACR Cryptol. ePrint Arch. 2011: 561 (2011) - 2010
- [j42]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
:
Inductive trace properties for computational security. J. Comput. Secur. 18(6): 1035-1073 (2010) - [c126]Devdatta Akhawe, Adam Barth, Peifung E. Lam, John C. Mitchell
, Dawn Song:
Towards a Formal Foundation of Web Security. CSF 2010: 290-304 - [c125]Adam Barth, Benjamin I. P. Rubinstein
, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett
:
A Learning-Based Approach to Reactive Security. Financial Cryptography 2010: 192-206 - [c124]Jason Bau, John C. Mitchell:
A Security Evaluation of DNSSEC with NSEC3. NDSS 2010 - [c123]Sergio Maffeis
, John C. Mitchell
, Ankur Taly:
Object Capabilities and Isolation of Untrusted Web Applications. IEEE Symposium on Security and Privacy 2010: 125-140 - [c122]Jason Bau, Elie Bursztein, Divij Gupta, John C. Mitchell
:
State of the Art: Automated Black-Box Web Application Vulnerability Testing. IEEE Symposium on Security and Privacy 2010: 332-345 - [c121]Elie Bursztein, Steven Bethard, Celine Fabry, John C. Mitchell
, Daniel Jurafsky:
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation. IEEE Symposium on Security and Privacy 2010: 399-413 - [c120]Linda Briesemeister, Steven Dawson, Patrick Lincoln, Hassen Saïdi, Jim Thornton, Glenn Durfee, Peter C. S. Kwan, Elizabeth Stinson, Adam J. Oliner, John C. Mitchell:
Homogeneity as an Advantage: It Takes a Community to Protect an Application. CollSec 2010 - [c119]Elie Bursztein, Baptiste Gourdin, Celine Fabry, Jason Bau, Gustav Rydstedt, Hristo Bojinov, Dan Boneh, John C. Mitchell:
Webseclab Security Education Workbench. CSET 2010 - [c118]Anupam Datta, Nipun Dave, John C. Mitchell, Helen Nissenbaum, Divya Sharma:
Privacy Challenges in Patient-centric Health Information Systems. HealthSec 2010 - [i8]Jason Bau, John C. Mitchell:
A Security Evaluation of DNSSEC with NSEC3. IACR Cryptol. ePrint Arch. 2010: 115 (2010)
2000 – 2009
- 2009
- [j41]Adam Barth, Collin Jackson, John C. Mitchell
:
Securing frame communication in browsers. Commun. ACM 52(6): 83-91 (2009) - [c117]Elie Bursztein, Peifung E. Lam, John C. Mitchell:
TrackBack spam: abuse and prevention. CCSW 2009: 3-10 - [c116]Elie Bursztein, John C. Mitchell:
Using Strategy Objectives for Network Security Analysis. Inscrypt 2009: 337-349 - [c115]Sergio Maffeis
, John C. Mitchell, Ankur Taly:
Isolating JavaScript with Filters, Rewriting, and Wrappers. ESORICS 2009: 505-522 - [c114]Timothy L. Hinrichs, Natasha Gude, Martín Casado, John C. Mitchell, Scott Shenker
:
Practical declarative network management. WREN 2009: 1-10 - [c113]Peifung E. Lam, John C. Mitchell, Sharada Sundaram:
A Formalization of HIPAA for a Medical Messaging System. TrustBus 2009: 73-85 - [e5]Ruth Breu, John C. Mitchell, Janos Sztipanovits, Alfred Winter:
Model-Based Design of Trustworthy Health Information Systems, 11.02. - 14.02.2009. Dagstuhl Seminar Proceedings 09073, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2009 [contents] - [i7]Ruth Breu, John C. Mitchell, Janos Sztipanovits, Alfred Winter:
09073 Abstracts Collection - Model-Based Design of Trustworthy Health Information Systems. Model-Based Design of Trustworthy Health Information Systems 2009 - [i6]Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Xiaodong Song, Peter L. Bartlett:
A Learning-Based Approach to Reactive Security. CoRR abs/0912.1155 (2009) - 2008
- [j40]Ralf Küsters, Anupam Datta, John C. Mitchell
, Ajith Ramanathan:
On the Relationships between Notions of Simulation-Based Security. J. Cryptol. 21(4): 492-546 (2008) - [c112]John C. Mitchell, Arnab Roy, Paul D. Rowe, Andre Scedrov
:
Analysis of EAP-GPSK Authentication Protocol. ACNS 2008: 309-327 - [c111]Sergio Maffeis
, John C. Mitchell, Ankur Taly:
An Operational Semantics for JavaScript. APLAS 2008: 307-325 - [c110]Adam Barth, Collin Jackson, John C. Mitchell:
Robust defenses for cross-site request forgery. CCS 2008: 75-88 - [c109]Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson
, Somesh Jha, John C. Mitchell:
A Layered Architecture for Detecting Malicious Behaviors. RAID 2008: 78-97 - [c108]Adam Barth, Collin Jackson, John C. Mitchell:
Securing Frame Communication in Browsers. USENIX Security Symposium 2008: 17-30 - [c107]Elizabeth Stinson, John C. Mitchell:
Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods. WOOT 2008 - [c106]John C. Mitchell
, Arnab Roy, Mukund Sundararajan:
An Automated Approach for Proving PCL Invariants. SecReT@LICS/CSF 2008: 93-113 - [p2]Elizabeth Stinson, John C. Mitchell:
Characterizing Bots' Remote Control Behavior. Botnet Detection 2008: 45-64 - 2007
- [c105]Adam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram:
Privacy and Utility in Business Processes. CSF 2007: 279-294 - [c104]Elizabeth Stinson, John C. Mitchell:
Characterizing Bots' Remote Control Behavior. DIMVA 2007: 89-108 - [c103]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive Proofs of Computational Secrecy. ESORICS 2007: 219-234 - [c102]Arnab Roy, Anupam Datta, John C. Mitchell:
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. TGC 2007: 312-329 - [c101]Collin Jackson, Dan Boneh, John C. Mitchell:
Transaction Generators: Root Kits for Web. HotSec 2007 - [c100]Anupam Datta, Ante Derek, John C. Mitchell
, Arnab Roy:
Protocol Composition Logic (PCL). Computation, Meaning, and Logic 2007: 311-358 - [i5]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive Proof Method for Computational Secrecy. IACR Cryptol. ePrint Arch. 2007: 165 (2007) - 2006
- [j39]Ninghui Li, John C. Mitchell:
Understanding SPKI/SDSI using first-order logic. Int. J. Inf. Sec. 5(1): 48-64 (2006) - [j38]John C. Mitchell
, Ajith Ramanathan, Andre Scedrov
, Vanessa Teague:
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theor. Comput. Sci. 353(1-3): 118-164 (2006) - [j37]Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell
, Mathieu Turuani:
Compositional analysis of contract-signing protocols. Theor. Comput. Sci. 367(1-2): 33-56 (2006) - [c99]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert:
Secrecy Analysis in Protocol Composition Logic. ASIAN 2006: 197-213 - [c98]Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi:
Computationally Sound Compositional Logic for Key Exchange Protocols. CSFW 2006: 321-334 - [c97]Adam Barth, John C. Mitchell:
Managing Digital Rights using Linear Logic. LICS 2006: 127-136 - [c96]Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum:
Privacy and Contextual Integrity: Framework and Applications. S&P 2006: 184-198 - [c95]Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
:
Games and the Impossibility of Realizable Ideal Functionality. TCC 2006: 360-379 - [c94]Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell:
Protecting browser state from web privacy attacks. WWW 2006: 737-744 - [i4]Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi:
Key Exchange Protocols: Security Definition, Proof Method and Applications. IACR Cryptol. ePrint Arch. 2006: 56 (2006) - [i3]Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security. IACR Cryptol. ePrint Arch. 2006: 153 (2006) - [i2]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive Trace Properties for Computational Security. IACR Cryptol. ePrint Arch. 2006: 486 (2006) - 2005
- [j36]Ninghui Li, John C. Mitchell, William H. Winsborough:
Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3): 474-514 (2005) - [j35]Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
:
A derivation system and compositional logic for security protocols. J. Comput. Secur. 13(3): 423-482 (2005) - [j34]Rohit Chadha, John C. Mitchell
, Andre Scedrov
, Vitaly Shmatikov:
Contract signing, optimism, and advantage. J. Log. Algebraic Methods Program. 64(2): 189-218 (2005) - [c93]Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell:
A modular correctness proof of IEEE 802.11i and TLS. CCS 2005: 2-15 - [c92]Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani:
Compositional Analysis of Contract Signing Protocols. CSFW 2005: 94-110 - [c91]Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani:
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. ICALP 2005: 16-29 - [c90]Changhua He, John C. Mitchell:
Security Analysis and Improvements for IEEE 802.11i. NDSS 2005 - [c89]Adam Barth, John C. Mitchell:
Enterprise privacy promises and enforcement. WITS 2005: 58-66 - [c88]John C. Mitchell:
Security analysis of network protocols: logical and computational methods. PPDP 2005: 151-152 - [c87]Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security. TCC 2005: 476-494 - [c86]Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John C. Mitchell:
Stronger Password Authentication Using Browser Extensions. USENIX Security Symposium 2005 - [e4]Vijay Atluri, Pierangela Samarati, Ralf Küsters, John C. Mitchell:
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005. ACM 2005, ISBN 1-59593-231-3 [contents] - [i1]Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov:
Games and the Impossibility of Realizable Ideal Functionality. IACR Cryptol. ePrint Arch. 2005: 211 (2005) - 2004
- [j33]Ajay Chander, Drew Dean, John C. Mitchell:
Reconstructing Trust Management. J. Comput. Secur. 12(1): 131-164 (2004) - [j32]Nancy A. Durgin, Patrick Lincoln, John C. Mitchell:
Multiset rewriting and the complexity of bounded security protocols. J. Comput. Secur. 12(2): 247-311 (2004) - [c85]Ninghui Li, John C. Mitchell, Derrick Tong:
Securing Java RMI-Based Distributed Applications. ACSAC 2004: 262-271 - [c84]Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic:
Abstraction and Refinement in Protocol Derivation. CSFW 2004: 30- - [c83]Ajith Ramanathan, John C. Mitchell, Andre Scedrov, Vanessa Teague:
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. FoSSaCS 2004: 468-483 - [c82]Ajay Chander, Drew Dean, John C. Mitchell:
A Distributed High Assurance Reference Monitor. ISC 2004: 231-244 - [c81]Neil Chou, Robert Ledesma, Yuka Teraguchi, John C. Mitchell:
Client-Side Defense Against Web-Based Identity Theft. NDSS 2004 - [c80]Adam Barth, John C. Mitchell, Justin Rosenstein:
Conflict and combination in privacy policy languages. WPES 2004: 45-46 - [c79]Changhua He, John C. Mitchell:
Analysis of the 802.11i 4-way handshake. Workshop on Wireless Security 2004: 43-50 - [e3]Jean-Jacques Lévy, Ernst W. Mayr, John C. Mitchell:
Exploring New Frontiers of Theoretical Informatics, IFIP 18th World Computer Congress, TC1 3rd International Conference on Theoretical Computer Science (TCS2004), 22-27 August 2004, Toulouse, France. IFIP 155, Kluwer/Springer 2004, ISBN 1-4020-8140-5 [contents] - 2003
- [b3]John C. Mitchell:
Concepts in programming languages. Cambridge University Press 2003, ISBN 978-0-521-78098-8, pp. I-X, 1-529 - [j31]Stephen N. Freund
, John C. Mitchell:
A Type System for the Java Bytecode Language and Verifier. J. Autom. Reason. 30(3-4): 271-321 (2003) - [j30]Ninghui Li, William H. Winsborough, John C. Mitchell:
Distributed Credential Chain Discovery in Trust Management. J. Comput. Secur. 11(1): 35-86 (2003) - [j29]Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic
:
A Compositional Logic for Proving Security Properties of Protocols. J. Comput. Secur. 11(4): 677-722 (2003) - [j28]Mourad Debbabi
, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell:
Security by typing. Int. J. Softw. Tools Technol. Transf. 4(4): 472-495 (2003) - [c78]Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic:
Secure protocol composition. FMSE 2003: 11-23 - [c77]Michael Backes, Catherine Meadows, John C. Mitchell:
Relating cryptography and formal methods: a panel. FMSE 2003: 61-66 - [c76]Paulo Mateus, John C. Mitchell, Andre Scedrov:
Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus. CONCUR 2003: 323-345 - [c75]Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov:
Contract Signing, Optimism, and Advantage. CONCUR 2003: 361-377 - [c74]Ninghui Li, John C. Mitchell:
Understanding SPKI/SDSI Using First-Order Logic. CSFW 2003: 89- - [c73]Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
:
A Derivation System for Security Protocols and its Logical Formalization. CSFW 2003: 109-125 - [c72]Ninghui Li, John C. Mitchell:
A Role-based Trust-management Framework. DISCEX (1) 2003: 201- - [c71]Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic:
Secure Protocol Composition. MFPS 2003: 201-226 - [c70]Ninghui Li, John C. Mitchell:
DATALOG with Constraints: A Foundation for Trust Management Languages. PADL 2003: 58-73 - [c69]Ninghui Li, William H. Winsborough, John C. Mitchell:
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. S&P 2003: 123-139 - [c68]David Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz:
Specifying and Verifying Hardware for Tamper-Resistant Software. S&P 2003: 166- - 2002
- [j27]Vitaly Shmatikov, John C. Mitchell:
Finite-state analysis of two contract signing protocols. Theor. Comput. Sci. 283(2): 419-450 (2002) - [c67]John C. Mitchell, Vanessa Teague:
Autonomous Nodes and Distributed Mechanisms. ISSS 2002: 58-83 - [c66]Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov:
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. ISSS 2002: 356-383 - [c65]John C. Mitchell:
Multiset Rewriting and Security Protocol Analysis. RTA 2002: 19-22 - [c64]Ninghui Li, John C. Mitchell, William H. Winsborough:
Design of a Role-Based Trust-Management Framework. S&P 2002: 114-130 - [e2]John Launchbury, John C. Mitchell:
Conference Record of POPL 2002: The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Portland, OR, USA, January 16-18, 2002. ACM 2002, ISBN 1-58113-450-9 [contents] - 2001
- [c63]Ninghui Li, William H. Winsborough, John C. Mitchell:
Distributed credential chain discovery in trust management: extended abstract. CCS 2001: 156-165 - [c62]Ajay Chander, John C. Mitchell, Drew Dean:
A State-Transition Model of Trust Management and Access Control. CSFW 2001: 27-43 - [c61]Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic
:
A Compositional Logic for Protocol Correctness. CSFW 2001: 241-255 - [c60]John C. Mitchell:
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis. ESOP 2001: 23-29 - [c59]John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague:
Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis. LICS 2001: 3-5 - [c58]John C. Mitchell:
Programming language methods in computer security. POPL 2001: 1-3 - [c57]John C. Mitchell, Ajith Ramanathan, Andre Scedrov
, Vanessa Teague:
A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report). MFPS 2001: 280-310 - 2000
- [c56]David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz:
Architectural Support for Copy and Tamper Resistant Software. ASPLOS 2000: 168-177 - [c55]Iliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov:
Relating Strands and Multiset Rewriting for Security Protocol Analysis. CSFW 2000: 35-51 - [c54]Vitaly Shmatikov, John C. Mitchell:
Analysis of Abuse-Free Contract Signing. Financial Cryptography 2000: 174-191 - [c53]Vitaly Shmatikov, John C. Mitchell:
Analysis of a Fair Exchange Protocol. NDSS 2000
1990 – 1999
- 1999
- [j26]Robert Harper, John C. Mitchell:
Parametricity and Variants of Girard's J Operator. Inf. Process. Lett. 70(1): 1-5 (1999) - [j25]Patrick Lincoln, John C. Mitchell, Andre Scedrov:
Optimization Complexity of Linear Logic Proof Games. Theor. Comput. Sci. 227(1-2): 299-331 (1999) - [j24]Stephen N. Freund
, John C. Mitchell:
The type system for object initializatiion in the Jave bytecode language. ACM Trans. Program. Lang. Syst. 21(6): 1196-1250 (1999) - [c52]Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov:
A Meta-Notation for Protocol Analysis. CSFW 1999: 55-69 - [c51]Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov
:
Probabilistic Polynomial-Time Equivalence and Security Analysis. World Congress on Formal Methods 1999: 776-793 - [c50]Stephen N. Freund
, John C. Mitchell:
A Formal Framework for the Java Bytecode Language and Verifier. OOPSLA 1999: 147-166 - [c49]Viviana Bono
, John C. Mitchell, Amit Patel, Vitaly Shmatikov:
A Core Calculus of Classes and Objects. MFPS 1999: 28-49 - 1998
- [j23]Kathleen Fisher, John C. Mitchell:
On the Relationship Between Classes, Objects, and Data Abstraction. Theory Pract. Object Syst. 4(1): 3-25 (1998) - [c48]John C. Mitchell:
Finite-State Analysis of Security Protocols. CAV 1998: 71-76 - [c47]Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov:
A Probabilistic Poly-Time Framework for Protocol Analysis. CCS 1998: 112-121 - [c46]John C. Mitchell, Mark Mitchell, Andre Scedrov:
A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time. FOCS 1998: 725-733 - [c45]Stephen N. Freund
, John C. Mitchell:
A Type System for Object Initialization in the Java Bytecode Language. OOPSLA 1998: 310-327 - [c44]John C. Mitchell, Vitaly Shmatikov, Ulrich Stern:
Finite-State Analysis of SSL 3.0. USENIX Security Symposium 1998 - 1997
- [j22]John C. Mitchell, Jon G. Riecke:
The analysis of programming structure. SIGACT News 28(2): 24-31 (1997) - [j21]Robert Harper, John C. Mitchell:
ML and Beyond. ACM SIGPLAN Notices 32(1): 80-85 (1997) - [c43]Ole Agesen, Stephen N. Freund
, John C. Mitchell:
Adding Type Parameterization to the Java Language. OOPSLA 1997: 49-65 - [c42]John C. Mitchell, Mark Mitchell, Ulrich Stern:
Automated analysis of cryptographic protocols using Mur-phi. S&P 1997: 141-151 - [c41]Stephen N. Freund
, John C. Mitchell:
A Type System For Object Initialization In the Java Bytecode Language. HOOTS 1997: 242-245 - 1996
- [b2]John C. Mitchell:
Foundations for programming languages. Foundation of computing series, MIT Press 1996, ISBN 978-0-262-13321-0, pp. I-XIX, 1-846 - [j20]Patrick Lincoln, John C. Mitchell, Andre Scedrov:
Linear logic proof games and optimization. Bull. Symb. Log. 2(3): 322-338 (1996) - [j19]Robert Harper, John C. Mitchell:
ML and Beyond. ACM Comput. Surv. 28(4es): 219 (1996) - [j18]Carl A. Gunter, John C. Mitchell, David Notkin:
Strategic Directions in Software Engineering and Programming Languages. ACM Comput. Surv. 28(4): 727-737 (1996) - [j17]John C. Mitchell, Ramesh Viswanathan:
Standard ML-NJ Weak Polymorphism and Imperative Constructs. Inf. Comput. 127(2): 102-116 (1996) - [c40]John C. Mitchell, Ramesh Viswanathan:
Effective Models of Polymorphism, Subtyping and Recursion (Extended Abstract). ICALP 1996: 170-181 - [c39]Patrick Lincoln, John C. Mitchell, Andre Scedrov
:
The Complexity of Local Proof Search in Linear Logic. Linear Logic Tokyo Meeting 1996: 120-129 - 1995
- [j16]Kathleen Fisher, John C. Mitchell:
The Development of Type Systems for Object-Oriented Languages. Theory Pract. Object Syst. 1(3): 189-220 (1995) - [c38]Kathleen Fisher, John C. Mitchell:
A Delegation-based Object Calculus with Subtying. FCT 1995: 42-61 - [c37]My Hoang, John C. Mitchell:
Lower Bounds on Type Inference with Subtypes. POPL 1995: 176-185 - 1994
- [j15]Luca Cardelli
, Simone Martini
, John C. Mitchell, Andre Scedrov
:
An Extension of System F with Subtyping. Inf. Comput. 109(1/2): 4-56 (1994) - [j14]Kathleen Fisher, Furio Honsell, John C. Mitchell:
A lambda Calculus of Objects and Method Specialization. Nord. J. Comput. 1(1): 3-37 (1994) - [c36]Dinesh Katiyar, David C. Luckham, John C. Mitchell:
Polymorphism and Subtyping in Interfaces. Workshop on Interface Definition Languages 1994: 22-34 - [c35]Dinesh Katiyar, David C. Luckham, John C. Mitchell:
A Type System for Prototyping Languages. POPL 1994: 138-150 - [c34]Kathleen Fisher, John C. Mitchell:
Notes on Typed Object-Oriented Programming. TACS 1994: 844-885 - [e1]Masami Hagiya, John C. Mitchell:
Theoretical Aspects of Computer Software, International Conference TACS '94, Sendai, Japan, April 19-22, 1994, Proceedings. Lecture Notes in Computer Science 789, Springer 1994, ISBN 3-540-57887-0 [contents] - 1993
- [j13]Lalita Jategaonkar, John C. Mitchell:
Type Inference with Extended Pattern Matching and Subtypes. Fundam. Informaticae 19(1/2): 127-165 (1993) - [j12]John C. Mitchell:
On Abstraction and the Expressive Power of Programming Languages. Sci. Comput. Program. 21(2): 141-163 (1993) - [j11]Robert Harper, John C. Mitchell:
On the Type Structure of Standard ML. ACM Trans. Program. Lang. Syst. 15(2): 211-252 (1993) - [c33]My Hoang, John C. Mitchell, Ramesh Viswanathan:
Standard ML-NJ weak polymorphism and imperative constructs. LICS 1993: 15-25 - [c32]John C. Mitchell, Furio Honsell, Kathleen Fisher:
A lambda calculus of objects and method specialization. LICS 1993: 26-38 - 1992
- [j10]Patrick Lincoln, John C. Mitchell, Andre Scedrov
, Natarajan Shankar:
Decision Problems for Propositional Linear Logic. Ann. Pure Appl. Log. 56(1-3): 239-311 (1992) - [c31]John C. Mitchell, Andre Scedrov:
Notes on Sconing and Relators. CSL 1992: 352-378 - [c30]Patrick Lincoln, John C. Mitchell:
Operational aspects of linear lambda calculus. LICS 1992: 235-246 - [c29]Patrick Lincoln, John C. Mitchell:
Algorithmic Aspects of Type Inference with Subtypes. POPL 1992: 293-304 - [c28]Kim B. Bruce, John C. Mitchell:
PER Models of Subtyping, Recursive Types and Higher-Order Polymorphism. POPL 1992: 316-327 - 1991
- [j9]John C. Mitchell, Eugenio Moggi
:
Kripke-Style Models for Typed lambda Calculus. Ann. Pure Appl. Log. 51(1-2): 99-124 (1991) - [j8]John C. Mitchell:
Type Inference With Simple Subtypes. J. Funct. Program. 1(3): 245-285 (1991) - [j7]Luca Cardelli
, John C. Mitchell:
Operations on Records. Math. Struct. Comput. Sci. 1(1): 3-48 (1991) - [c27]John C. Mitchell:
On the Equivalence of Data Representations. Artificial and Mathematical Theory of Computation 1991: 305-329 - [c26]Paris C. Kanellakis, Harry G. Mairson, John C. Mitchell:
Unification and ML-Type Reconstruction. Computational Logic - Essays in Honor of Alan Robinson 1991: 444-478 - [c25]Stuart A. Kurtz, John C. Mitchell, Michael J. O'Donnell:
Connecting Formal Semantics to Constructive Intuitions. Constructivity in Computer Science 1991: 1-21 - [c24]John C. Mitchell, Sigurd Meldal, Neel Madhav:
An Extension of Standard ML Modules with Subtyping and Inheritance. POPL 1991: 270-278 - [c23]John C. Mitchell:
On Abstraction and the Expressive Power of Programming Languages. TACS 1991: 290-310 - [c22]Luca Cardelli
, Simone Martini, John C. Mitchell, Andre Scedrov:
An Extension of System F with Subtyping. TACS 1991: 750-770 - 1990
- [j6]Kim B. Bruce, Albert R. Meyer
, John C. Mitchell:
The Semantics of Second-Order Lambda Calculus. Inf. Comput. 85(1): 76-134 (1990) - [c21]Patrick Lincoln, John C. Mitchell, Andre Scedrov, Natarajan Shankar:
Decision Problems for Propositional Linear Logic. FOCS 1990: 662-671 - [c20]Brian T. Howard, John C. Mitchell:
Operational and Axiomatic Semantics of PCF. LISP and Functional Programming 1990: 298-306 - [c19]John C. Mitchell:
Toward a Typed Foundation for Method Specialization and Inheritance. POPL 1990: 109-124 - [c18]Robert Harper, John C. Mitchell, Eugenio Moggi:
Higher-Order Modules and the Phase Distinction. POPL 1990: 341-354 - [p1]John C. Mitchell:
Type Systems for Programming Languages. Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B) 1990: 365-458
1980 – 1989
- 1989
- [c17]Luca Cardelli
, John C. Mitchell:
Operations in Records. Category Theory and Computer Science 1989: 75-81 - [c16]Peter S. Canning, William R. Cook, Walter L. Hill, Walter G. Olthoff, John C. Mitchell:
F-Bounded Polymorphism for Object-Oriented Programming. FPCA 1989: 273-280 - [c15]Luca Cardelli
, John C. Mitchell:
Operations on Records. Mathematical Foundations of Programming Semantics 1989: 22-52 - [c14]Paris C. Kanellakis, John C. Mitchell:
Polymorphic Unification and ML Typing. POPL 1989: 105-115 - 1988
- [j5]John C. Mitchell:
Polymorphic Type Inference and Containment. Inf. Comput. 76(2/3): 211-249 (1988) - [j4]John C. Mitchell, Gordon D. Plotkin:
Abstract Types Have Existential Type. ACM Trans. Program. Lang. Syst. 10(3): 470-502 (1988) - [c13]Lalita Jategaonkar, John C. Mitchell:
ML with Extended Pattern Matching and Subtypes. LISP and Functional Programming 1988: 198-211 - [c12]John C. Mitchell, Robert Harper:
The Essence of ML. POPL 1988: 28-46 - 1987
- [c11]John C. Mitchell, Eugenio Moggi:
Kripke-Style models for typed lambda calculus. LICS 1987: 303-314 - [c10]Albert R. Meyer, John C. Mitchell, Eugenio Moggi
, Richard Statman:
Empty Types in Polymorphic Lambda Calculus. POPL 1987: 253-262 - 1986
- [c9]John C. Mitchell:
A Type-Inference Approach to Reduction Properties and Semantics of Polymorphic Expressions (Summary). LISP and Functional Programming 1986: 308-319 - [c8]John C. Mitchell:
Representation Independence and Data Abstraction. POPL 1986: 263-276 - [c7]John C. Mitchell, Michael J. O'Donnell:
Realisability Semantics for Error-Tolerant Logics. TARK 1986: 363-382 - 1985
- [c6]John C. Mitchell, Albert R. Meyer:
Second-Order Logical Relations (Extended Abstract). Logic of Programs 1985: 225-236 - [c5]John C. Mitchell, Gordon D. Plotkin:
Abstract Types Have Existential Type. POPL 1985: 37-51 - 1984
- [b1]John C. Mitchell:
Lambda calculus models of typed programming languages. Massachusetts Institute of Technology, Cambridge, MA, USA, 1984 - [j3]Cynthia Dwork, Paris C. Kanellakis, John C. Mitchell:
On the Sequential Nature of Unification. J. Log. Program. 1(1): 35-50 (1984) - [c4]John C. Mitchell:
Semantic Models for Second-Order Lambda Calculus. FOCS 1984: 289-299 - [c3]John C. Mitchell:
Coercion and Type Inference. POPL 1984: 175-185 - 1983
- [j2]Albert R. Meyer
, John C. Mitchell:
Termination Assertions for Recursive Programs: Completeness and Axiomatic Definability. Inf. Control. 56(1/2): 112-138 (1983) - [j1]John C. Mitchell:
The Implication Problem for Functional and Inclusion Dependencies. Inf. Control. 56(3): 154-173 (1983) - [c2]John C. Mitchell:
Inference Rules for Functional and Inclusion Dependencies. PODS 1983: 58-69 - 1982
- [c1]Albert R. Meyer, John C. Mitchell:
Axiomatic Definability and Completeness for Recursive Programs. POPL 1982: 337-346
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 21:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint