What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
John C. Mitchell
Google Scholar
ORCID:
0000-0002-0024-860X
49
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/sp
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time.
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
2019
journals/joc
Automated Analysis of Cryptographic Assumptions in Generic Group Models.
Gilles Barthe
Edvard Fagerholm
Dario Fiore
John C. Mitchell
Andre Scedrov
Benedikt Schmidt
2018
conf/esorics
Data Oblivious Genome Variants Search on Intel SGX.
Avradip Mandal
John C. Mitchell
Hart Montgomery
Arnab Roy
2017
conf/cns
Privacy for targeted advertising.
Avradip Mandal
John C. Mitchell
Hart William Montgomery
Arnab Roy
2016
conf/sp
Target Fragmentation in Android Apps.
Patrick Mutchler
Yeganeh Safaei
Adam Doupé
John C. Mitchell
2016
conf/ndss
Privacy-Preserving Shortest Path Computation.
David J. Wu
Joe Zimmerman
Jérémy Planul
John C. Mitchell
2014
conf/crypto
Automated Analysis of Cryptographic Assumptions in Generic Group Models.
Gilles Barthe
Edvard Fagerholm
Dario Fiore
John C. Mitchell
Andre Scedrov
Benedikt Schmidt
2013
conf/uss
Understanding the Challenges with Medical Data Segmentation for Privacy.
Ellick Chan
Peifung E. Lam
John C. Mitchell
2012
conf/sp
Third-Party Web Tracking: Policy and Technology.
Jonathan R. Mayer
John C. Mitchell
2011
conf/ccs
Text-based CAPTCHA strengths and weaknesses.
Elie Bursztein
Matthieu Martin
John C. Mitchell
2011
conf/sp
Automated Analysis of Security-Critical JavaScript APIs.
Ankur Taly
Úlfar Erlingsson
John C. Mitchell
Mark S. Miller
Jasvir Nagra
2011
conf/sp
The Failure of Noise-Based Non-continuous Audio Captchas.
Elie Bursztein
Romain Beauxis
Hristo S. Paskov
Daniele Perito
Celine Fabry
John C. Mitchell
2011
conf/esorics
Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs.
Elie Bursztein
Baptiste Gourdin
John C. Mitchell
2010
conf/uss
Homogeneity as an Advantage: It Takes a Community to Protect an Application.
Linda Briesemeister
Steven Dawson
Patrick Lincoln
Hassen Saïdi
Jim Thornton
Glenn Durfee
Peter C. S. Kwan
Elizabeth Stinson
Adam J. Oliner
John C. Mitchell
2010
conf/uss
Privacy Challenges in Patient-centric Health Information Systems.
Anupam Datta
Nipun Dave
John C. Mitchell
Helen Nissenbaum
Divya Sharma
2010
conf/uss
Webseclab Security Education Workbench.
Elie Bursztein
Baptiste Gourdin
Celine Fabry
Jason Bau
Gustav Rydstedt
Hristo Bojinov
Dan Boneh
John C. Mitchell
2010
conf/fc
A Learning-Based Approach to Reactive Security.
Adam Barth
Benjamin I. P. Rubinstein
Mukund Sundararajan
John C. Mitchell
Dawn Song
Peter L. Bartlett
2010
conf/sp
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation.
Elie Bursztein
Steven Bethard
Celine Fabry
John C. Mitchell
Daniel Jurafsky
2010
conf/sp
State of the Art: Automated Black-Box Web Application Vulnerability Testing.
Jason Bau
Elie Bursztein
Divij Gupta
John C. Mitchell
2010
conf/sp
Object Capabilities and Isolation of Untrusted Web Applications.
Sergio Maffeis
John C. Mitchell
Ankur Taly
2010
conf/ndss
A Security Evaluation of DNSSEC with NSEC3.
Jason Bau
John C. Mitchell
2009
conf/ccs
TrackBack spam: abuse and prevention.
Elie Bursztein
Peifung E. Lam
John C. Mitchell
2009
conf/esorics
Isolating JavaScript with Filters, Rewriting, and Wrappers.
Sergio Maffeis
John C. Mitchell
Ankur Taly
2008
journals/joc
On the Relationships between Notions of Simulation-Based Security.
Ralf Küsters
Anupam Datta
John C. Mitchell
Ajith Ramanathan
2008
conf/ccs
Robust defenses for cross-site request forgery.
Adam Barth
Collin Jackson
John C. Mitchell
2008
conf/uss
Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods.
Elizabeth Stinson
John C. Mitchell
2008
conf/uss
Securing Frame Communication in Browsers.
Adam Barth
Collin Jackson
John C. Mitchell
2008
conf/acns
Analysis of EAP-GPSK Authentication Protocol.
John C. Mitchell
Arnab Roy
Paul D. Rowe
Andre Scedrov
2007
conf/uss
Transaction Generators: Root Kits for Web.
Collin Jackson
Dan Boneh
John C. Mitchell
2007
conf/esorics
Inductive Proofs of Computational Secrecy.
Arnab Roy
Anupam Datta
Ante Derek
John C. Mitchell
2006
conf/sp
Privacy and Contextual Integrity: Framework and Applications.
Adam Barth
Anupam Datta
John C. Mitchell
Helen Nissenbaum
2006
conf/tcc
Games and the Impossibility of Realizable Ideal Functionality.
Anupam Datta
Ante Derek
John C. Mitchell
Ajith Ramanathan
Andre Scedrov
2005
conf/ccs
A modular correctness proof of IEEE 802.11i and TLS.
Changhua He
Mukund Sundararajan
Anupam Datta
Ante Derek
John C. Mitchell
2005
conf/uss
Stronger Password Authentication Using Browser Extensions.
Blake Ross
Collin Jackson
Nick Miyake
Dan Boneh
John C. Mitchell
2005
conf/ndss
Security Analysis and Improvements for IEEE 802.11i.
Changhua He
John C. Mitchell
2005
conf/tcc
On the Relationships Between Notions of Simulation-Based Security.
Anupam Datta
Ralf Küsters
John C. Mitchell
Ajith Ramanathan
2004
conf/ndss
Client-Side Defense Against Web-Based Identity Theft.
Neil Chou
Robert Ledesma
Yuka Teraguchi
John C. Mitchell
2004
conf/acsac
Securing Java RMI-Based Distributed Applications.
Ninghui Li
John C. Mitchell
Derrick Tong
2003
conf/ccs
Secure protocol composition.
Anupam Datta
Ante Derek
John C. Mitchell
Dusko Pavlovic
2003
conf/ccs
Relating cryptography and formal methods: a panel.
Michael Backes
Catherine Meadows
John C. Mitchell
2003
conf/sp
Specifying and Verifying Hardware for Tamper-Resistant Software.
David Lie
John C. Mitchell
Chandramohan A. Thekkath
Mark Horowitz
2003
conf/sp
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management.
Ninghui Li
William H. Winsborough
John C. Mitchell
2002
conf/sp
Design of a Role-Based Trust-Management Framework.
Ninghui Li
John C. Mitchell
William H. Winsborough
2001
conf/ccs
Distributed credential chain discovery in trust management: extended abstract.
Ninghui Li
William H. Winsborough
John C. Mitchell
2000
conf/fc
Analysis of Abuse-Free Contract Signing.
Vitaly Shmatikov
John C. Mitchell
2000
conf/ndss
Analysis of a Fair Exchange Protocol.
Vitaly Shmatikov
John C. Mitchell
1998
conf/ccs
A Probabilistic Poly-Time Framework for Protocol Analysis.
Patrick Lincoln
John C. Mitchell
Mark Mitchell
Andre Scedrov
1998
conf/uss
Finite-State Analysis of SSL 3.0.
John C. Mitchell
Vitaly Shmatikov
Ulrich Stern
1997
conf/sp
Automated analysis of cryptographic protocols using Mur-phi.
John C. Mitchell
Mark Mitchell
Ulrich Stern
Coauthors
Adam Barth
(4)
Adam Doupé
(1)
Adam J. Oliner
(1)
Ajith Ramanathan
(3)
Andre Scedrov
(5)
Ankur Taly
(3)
Ante Derek
(4)
Anupam Datta
(8)
Arnab Roy
(4)
Avradip Mandal
(2)
Baptiste Gourdin
(2)
Benedikt Schmidt
(2)
Benjamin I. P. Rubinstein
(1)
Blake Ross
(1)
Caroline Trippel
(1)
Catherine Meadows
(1)
Celine Fabry
(3)
Chandramohan A. Thekkath
(1)
Changhua He
(2)
Collin Jackson
(4)
Dan Boneh
(3)
Daniel Jurafsky
(1)
Daniele Perito
(1)
Dario Fiore
(2)
David J. Wu
(1)
David Lie
(1)
Dawn Song
(1)
Derrick Tong
(1)
Divij Gupta
(1)
Divya Sharma
(1)
Dusko Pavlovic
(1)
Edvard Fagerholm
(2)
Elie Bursztein
(7)
Elizabeth Stinson
(2)
Ellick Chan
(1)
Gilles Barthe
(2)
Glenn Durfee
(1)
Gustav Rydstedt
(1)
Hamed Nemati
(1)
Hart Montgomery
(1)
Hart William Montgomery
(1)
Hassen Saïdi
(1)
Helen Nissenbaum
(2)
Hristo Bojinov
(1)
Hristo S. Paskov
(1)
Jason Bau
(3)
Jasvir Nagra
(1)
Jérémy Planul
(1)
Jim Thornton
(1)
Joe Zimmerman
(1)
John C. Mitchell
(49)
Jonathan R. Mayer
(1)
Linda Briesemeister
(1)
Mark Horowitz
(1)
Mark Mitchell
(2)
Mark S. Miller
(1)
Matthieu Martin
(1)
Michael Backes
(1)
Mukund Sundararajan
(2)
Neil Chou
(1)
Nicholas Mosier
(1)
Nick Miyake
(1)
Ninghui Li
(4)
Nipun Dave
(1)
Patrick Lincoln
(2)
Patrick Mutchler
(1)
Paul D. Rowe
(1)
Peifung E. Lam
(2)
Peter C. S. Kwan
(1)
Peter L. Bartlett
(1)
Ralf Küsters
(2)
Robert Ledesma
(1)
Romain Beauxis
(1)
Sergio Maffeis
(2)
Steven Bethard
(1)
Steven Dawson
(1)
Úlfar Erlingsson
(1)
Ulrich Stern
(2)
Vitaly Shmatikov
(3)
William H. Winsborough
(3)
Yeganeh Safaei
(1)
Yuka Teraguchi
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to