Cryptographers' World
 

John C. Mitchell


Author's Web Page Link

5 papers in database with 104 citations 

H-number: 3

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Ralf Küsters,  Anupam Datta,  John C. Mitchell,  Ajith Ramanathan,  On the Relationships between Notions of Simulation-Based Security, Journal of Cryptology, Volume 21(4), pp. 492 - 546, Springer, 2008.

[Cited 26 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. John C. Mitchell,  Arnab Roy,  Paul Rowe,  Andre Scedrov,  Analysis of EAP-GPSK Authentication Protocol, pp. 309 - 327, ACNS 2008.

[Electronic Edition][Cited 3 times ]

2. Anupam Datta,  Ante Derek,  John C. Mitchell,  Ajith Ramanathan,  Andre Scedrov,  Games and the Impossibility of Realizable Ideal Functionality, pp. 360 - 379, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

3. Anupam Datta,  Ralf Küsters,  John C. Mitchell,  Ajith Ramanathan,  On the Relationships Between Notions of Simulation-Based Security, pp. 476 - 494, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

4. Vitaly Shmatikov,  John C. Mitchell,  Analysis of Abuse-Free Contract Signing, pp. 174 - 191, FC 2000.

[Electronic Edition][Cited 41 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...