John Mitchell

Results: 387



#Item
91HTTP / Computer network security / URI schemes / Uniform resource locator / Ajax / Cross-site request forgery / HTTP cookie / Cross-site scripting / DNS rebinding / Computing / Software / Internet

Towards a Formal Foundation of Web Security Devdatta Akhawe∗ , Adam Barth∗ , Peifung E. Lam† , John Mitchell† and Dawn Song∗ ∗ University of California, Berkeley {devdatta,abarth,dawnsong}@cs.berkeley.edu †

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-05-02 17:49:28
92Security / Public safety / Environmental economics / Computer security / Anti-spam techniques / Network effect / Externality / Investment / Information security / Spamming / Economics / Email

Security decision-making among interdependent organizations R. Ann Miura-Ko, Benjamin Yolken, John Mitchell, and Nicholas Bambos Stanford University Abstract In various settings, such as when customers use the same

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 22:02:41
93Ballarat / Association of Commonwealth Universities / Geelong / Victoria / Melbourne / Deakin University / Economic growth / Geography of Australia / States and territories of Australia / Geography of Oceania

Hon. Dr Denis Napthine MLA Minister for Ports, Major Projects, Racing, Regional Cities Speech delivered to SEGRA delegates, Tuesday 25 OctoberCould I acknowledge Councillor John Mitchell the Mayor of the City of G

Add to Reading List

Source URL: www.segra.com.au

Language: English - Date: 2011-12-13 18:33:31
94Peter Burwash / John Paul DeJoria / GMR Group / Laird / Giant magnetoresistance / John Paul Mitchell Systems / Mastin / Sports / Nationality / Layne Beachley / Moshi / Layne

Featured In Hero Through revenue received from Hero, The Secret Company is honored to contribute to the following foundations and charities of Hero’s contributors. Michael Acton Smith

Add to Reading List

Source URL: images.thesecret.tv

Language: English - Date: 2015-03-02 14:27:55
95Temporal logic / Model theory / Propositional calculus / Mathematical logic / Interpretation / Substitution / Well-formed formula / Logic / Formal languages / Linear temporal logic

Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2004-05-03 19:17:14
96Computer network security / Software testing / Cross-site scripting / Vulnerability / Acunetix / Rapid7 / Remote file inclusion / Qualys / Cross-site request forgery / Computer security / Cyberwarfare / Computing

State of the Art: Automated Black-Box Web Application Vulnerability Testing Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell Stanford University Stanford, CA {jbau, divijg}@stanford.edu, {elie, mitchell}@cs.stanford

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 17:31:25
97Computing / Constraint satisfaction / Constraint logic programming / Datalog / Relational model / Structure / Logic programming / Constraint / Local consistency / Constraint programming / Software engineering / Computer programming

Datalog with Constraints: A Foundation for Trust Management Languages Ninghui Li and John C. Mitchell Department of Computer Science, Stanford University Gates 4B, Stanford, CA {ninghui.li, jcm}@cs.stanford.ed

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2002-11-05 19:04:46
98Battles of the War

EXTRACTS FROM THE DIARIES OF JOHN PIDCOCK (HARRY) MASON MITCHELL LIBRARY MSS 74 Despite his given names, Mason appears to have been known as Harry. The Mitchell Library has four versions of his Diary: Item 5

Add to Reading List

Source URL: notapoormansfield.com

Language: English - Date: 2010-05-13 12:52:51
    99Communications protocol / Data transmission / Protocols / Public-key cryptography / Cryptographic protocols / Network protocols / Cryptography / Data / Information

    Compositional Analysis of Contract Signing Protocols Michael Backes a , Anupam Datta b , Ante Derek b , John C. Mitchell b and Mathieu Turuani c a Saarland

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2007-12-18 01:01:14
    100Opera Software / Web browsers / Password / Phishing / Anti-spam techniques / World Wide Web / Opera / Website / Internet fraud / Software / Computing / Spamming

    Client-side defense against web-based identity theft Neil Chou Robert Ledesma Yuka Teraguchi John C. Mitchell Computer Science Department, Stanford University, Stanford CA 94305 {neilchou, led242, yukat, jcm}@stanford.ed

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2003-11-24 14:01:52
    UPDATE