TRNSYS 17: A transient system simulation program, solar energy laboratory SA Klein, WA Beckman, JW Mitchell, JA Duffie, NA Duffie, TL Freeman, ... Madison, Madison, USA: University of Wisconsin, 2010 | 1578* | 2010 |
Design of a role-based trust-management framework N Li, JC Mitchell, WH Winsborough Proceedings 2002 IEEE Symposium on Security and Privacy, 114-130, 2002 | 1117 | 2002 |
Architectural support for copy and tamper resistant software D Lie, C Thekkath, M Mitchell, P Lincoln, D Boneh, J Mitchell, M Horowitz Acm Sigplan Notices 35 (11), 168-177, 2000 | 1069 | 2000 |
Foundations for programming languages JC Mitchell MIT press, 1996 | 996 | 1996 |
Third-party web tracking: Policy and technology JR Mayer, JC Mitchell IEEE Symp Security and Privacy, 413-427, 2012 | 783 | 2012 |
Automated analysis of cryptographic protocols using mur/spl phi JC Mitchell, M Mitchell, U Stern Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997 | 781 | 1997 |
Abstract types have existential type JC Mitchell, GD Plotkin ACM Transactions on Programming Languages and Systems (TOPLAS) 10 (3), 470-502, 1988 | 777 | 1988 |
Client-side defense against web-based identity theft N Chou, R Ledesma, Y Teraguchi, JC Mitchell Network and Distributed Systems Security (NDSS), 2004 | 699* | 2004 |
Robust defenses for cross-site request forgery A Barth, C Jackson, JC Mitchell Proc ACM Conf on Computer and Communications Security, 75-88, 2008 | 658 | 2008 |
Privacy and contextual integrity: Framework and applications A Barth, A Datta, JC Mitchell, H Nissenbaum 2006 IEEE symposium on security and privacy (S&P'06), 15 pp.-198, 2006 | 585 | 2006 |
Stronger Password Authentication Using Browser Extensions. B Ross, C Jackson, N Miyake, D Boneh, JC Mitchell USENIX Security Symposium 17, 32, 2005 | 577 | 2005 |
Distributed credential chain discovery in trust management N Li, WH Winsborough, JC Mitchell Proceedings of the 8th ACM Conference on Computer and Communications …, 2001 | 577 | 2001 |
F-bounded polymorphism for object-oriented programming P Canning, W Cook, W Hill, W Olthoff, JC Mitchell Proceedings of the fourth international conference on functional programming …, 1989 | 550* | 1989 |
State of the art: Automated black-box web application vulnerability testing J Bau, E Bursztein, D Gupta, JC Mitchell IEEE Symposium on Security and Privacy, 332-345, 2010 | 508 | 2010 |
Text-based CAPTCHA strengths and weaknesses E Bursztein, M Martin, J Mitchell Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 482 | 2011 |
Type systems for programming languages JC Mitchell Formal Models and Semantics, 365-458, 1990 | 419 | 1990 |
Decision problems for propositional linear logic P Lincoln, J Mitchell, A Scedrov, N Shankar Annals of pure and applied logic 56 (1-3), 239-311, 1992 | 408 | 1992 |
Practical declarative network management TL Hinrichs, NS Gude, M Casado, JC Mitchell, S Shenker Proceedings of the 1st ACM workshop on Research on enterprise networking, 1-10, 2009 | 400 | 2009 |
Undecidability of bounded security protocols N Durgin, P Lincoln, J Mitchell, A Scedrov Workshop on formal methods and security protocols, 1999 | 384* | 1999 |
A meta-notation for protocol analysis I Cervesato, NA Durgin, PD Lincoln, JC Mitchell, A Scedrov Proceedings of the 12th IEEE Computer Security Foundations Workshop, 55-69, 1999 | 379 | 1999 |