The following pages link to John C. Mitchell (Q276486):
Displayed 50 items.
- Secure protocol composition (Q276488) (← links)
- The semantics of second-order lambda calculus (Q751294) (← links)
- Kripke-style models for typed lambda calculus (Q804559) (← links)
- Compositional analysis of contract-signing protocols (Q860896) (← links)
- On the relationships between notions of simulation-based security (Q1021241) (← links)
- Polymorphic type inference and containment (Q1110312) (← links)
- Item:Q276486 (redirect page) (← links)
- Subtyping can have a simple semantics (Q1177151) (← links)
- Decision problems for propositional linear logic (Q1192352) (← links)
- An extension of system \(F\) with subtyping (Q1322473) (← links)
- On abstraction and the expressive power of programming languages (Q1330458) (← links)
- A type system for the Java bytecode language and verifier (Q1405989) (← links)
- Optimization complexity of linear logic proof games (Q1575867) (← links)
- Finite-state analysis of two contract signing protocols (Q1603658) (← links)
- Parametricity and variants of Girard's \(J\) operator (Q1606917) (← links)
- Item:Q276486 (redirect page) (← links)
- Standard ML-NJ weak polymorphism and imperative constructs (Q1923097) (← links)
- A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols (Q2368990) (← links)
- Automated analysis of cryptographic assumptions in generic group models (Q2423840) (← links)
- Contract signing, optimism, and advantage (Q2484408) (← links)
- (Q2704326) (← links)
- (Q2763664) (← links)
- Protocol Composition Logic (PCL) (Q2864155) (← links)
- Automated Analysis of Cryptographic Assumptions in Generic Group Models (Q2874498) (← links)
- (Q2911606) (← links)
- (Q2965516) (← links)
- Using Strategy Objectives for Network Security Analysis (Q3056909) (← links)
- (Q3142165) (← links)
- Termination assertions for recursive programs: Completeness and axiomatic definability (Q3323258) (← links)
- The implication problem for functional and inclusion dependencies (Q3326888) (← links)
- Operations on records (Q3349962) (← links)
- Inductive Proofs of Computational Secrecy (Q3521245) (← links)
- Beyond proof-of-compliance: security analysis in trust management (Q3546305) (← links)
- (Q3680264) (← links)
- On the sequential nature of unification (Q3716320) (← links)
- (Q3827990) (← links)
- (Q4016557) (← links)
- (Q4222837) (← links)
- (Q4222945) (← links)
- (Q4261073) (← links)
- (Q4283246) (← links)
- (Q4322072) (← links)
- (Q4364534) (← links)
- (Q4385534) (← links)
- Concepts in Programming Languages (Q4406526) (← links)
- (Q4415096) (← links)
- (Q4418564) (← links)
- (Q4418589) (← links)
- (Q4490764) (← links)
- (Q4535056) (← links)