Search the dblp DataBase
Chris J. Mitchell :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mark P. Hoyle , Chris J. Mitchell On Solutions to the Key Escrow Problem. [Citation Graph (0, 0)][DBLP ] State of the Art in Applied Cryptography, 1997, pp:277-306 [Conf ] Karl Brincat , Chris J. Mitchell New CBC-MAC Forgery Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:3-14 [Conf ] Liqun Chen , Dieter Gollmann , Chris J. Mitchell Tailoring authentication protocols to match underlying mechanisms. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:121-133 [Conf ] Liqun Chen , Dieter Gollmann , Chris J. Mitchell , Peter R. Wild Secret Sharing with Reusable Polynomials. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:183-193 [Conf ] Andreas Pashalidis , Chris J. Mitchell A Taxonomy of Single Sign-On Systems. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:249-264 [Conf ] Chris J. Mitchell Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:560-571 [Conf ] Luciano Rila , Chris J. Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:254-264 [Conf ] Luciano Rila , Chris J. Mitchell Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication. [Citation Graph (0, 0)][DBLP ] CARDIS, 2002, pp:- [Conf ] Qiang Tang , Chris J. Mitchell On the Security of Some Password-Based Key Agreement Schemes. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:149-154 [Conf ] Qiang Tang , Chris J. Mitchell Efficient Compilers for Authenticated Group Key Exchange. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:192-197 [Conf ] Sattam S. Al-Riyami , Chris J. Mitchell Renewing crytographic timestamps. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:9-16 [Conf ] Chris J. Mitchell , Namhyun Hur On the security of a structural proven signer ordering multisignature scheme. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:1-8 [Conf ] Nigel Jefferies , Chris J. Mitchell , Michael Walker A Proposed Architecture for Trusted Third Party Services. [Citation Graph (0, 0)][DBLP ] Cryptography: Policy and Algorithms, 1995, pp:98-104 [Conf ] Don Coppersmith , Lars R. Knudsen , Chris J. Mitchell Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:184-196 [Conf ] Liqun Chen , Dieter Gollmann , Chris J. Mitchell Key distribution without individual trusted authentification servers. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:30-0 [Conf ] Peter Y. A. Ryan , Dieter Gollmann , Li Gong , Günter Karjoth , Chris J. Mitchell Panel Introduction: The Security Impact of Distributed Computing Technologies. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:164-166 [Conf ] Niklas Borselius , Chris J. Mitchell Securing FIPA Agent Communication. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:135-141 [Conf ] Georgios Kalogridis , Chris J. Mitchell , Gary Clemo Spy Agents: Evaluating Trust in Remote Environments. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:405-411 [Conf ] Mansour A. Al-Meaither , Chris J. Mitchell A Secure Electronic Payment Scheme for Charity Donations. [Citation Graph (0, 0)][DBLP ] EC-Web, 2003, pp:50-61 [Conf ] Vorapranee Khu-smith , Chris J. Mitchell Using EMV Cards to Protect E-commerce Transactions. [Citation Graph (0, 0)][DBLP ] EC-Web, 2002, pp:388-399 [Conf ] Vorapranee Khu-smith , Chris J. Mitchell Enhancing E-commerce Security Using GSM Authentication. [Citation Graph (0, 0)][DBLP ] EC-Web, 2003, pp:72-83 [Conf ] Philippe Godlewski , Chris J. Mitchell Key Minimal Authentication Systems for Unconditional Secrecy. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:497-501 [Conf ] Adil Alsaid , Chris J. Mitchell Installing Fake Root Keys in a PC. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2005, pp:227-239 [Conf ] Andreas Pashalidis , Chris J. Mitchell Using EMV Cards for Single Sign-On. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2004, pp:205-217 [Conf ] Geraint Price , Chris J. Mitchell Interoperation Between a Conventional PKI and an ID-Based Infrastructure. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2005, pp:73-85 [Conf ] Aline Gouget , Hervé Sibert , Côme Berbain , Nicolas Courtois , Blandine Debraize , Chris J. Mitchell Analysis of the Bit-Search Generator and Sequence Compression Techniques. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:196-214 [Conf ] Arnold K. L. Yau , Kenneth G. Paterson , Chris J. Mitchell Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:299-319 [Conf ] Pita Jarupunphol , Chris J. Mitchell Implementation Aspects of SET/EMV. [Citation Graph (0, 0)][DBLP ] I3E, 2002, pp:305-315 [Conf ] Liqun Chen , Chris J. Mitchell An anonymous and undeniable payment scheme. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:478-482 [Conf ] Qiang Tang , Chris J. Mitchell Security Properties of Two Authenticated Conference Key Agreement Protocols. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:304-314 [Conf ] Vorapranee Khu-smith , Chris J. Mitchell Enhancing the Security of Cookies. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:132-145 [Conf ] Andreas Pashalidis , Chris J. Mitchell A Security Model for Anonymous Credential Systems. [Citation Graph (0, 0)][DBLP ] International Information Security Workshops, 2004, pp:183-198 [Conf ] Niklas Borselius , Chris J. Mitchell , Aaron Wilson Undetachable Threshold Signatures. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:239-244 [Conf ] Karl Brincat , Chris J. Mitchell Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:63-72 [Conf ] Chris J. Mitchell Remote User Authentication Using Public Information. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:360-369 [Conf ] Chris J. Mitchell Partial Key Recovery Attacks on XCBC, TMAC and OMAC. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:155-167 [Conf ] Yongfei Han , Dieter Gollmann , Chris J. Mitchell Minimal Weight k-SR Representations. [Citation Graph (0, 0)][DBLP ] IMA Conf., 1995, pp:34-43 [Conf ] Chris J. Mitchell A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels. [Citation Graph (0, 0)][DBLP ] IMA Conf., 1995, pp:84-93 [Conf ] Konstantinos Rantos , Chris J. Mitchell Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:268-276 [Conf ] Keith M. Martin , Bart Preneel , Chris J. Mitchell , Hans-Joachim Hitz , Günther Horn , A. Poliakova , P. Howard Secure Billing for Mobile Information Services in UMTS. [Citation Graph (0, 0)][DBLP ] IS&N, 1998, pp:535-548 [Conf ] Chris J. Mitchell Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:244-258 [Conf ] Andreas Pashalidis , Chris J. Mitchell Single Sign-On Using Trusted Platforms. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:54-68 [Conf ] Shenglan Hu , Chris J. Mitchell Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling. [Citation Graph (0, 0)][DBLP ] MSN, 2005, pp:83-92 [Conf ] Niklas Borselius , Chris J. Mitchell , Aaron Wilson On Mobile Agent Based Transactions in Moderately Hostile Environments. [Citation Graph (0, 0)][DBLP ] Network Security, 2001, pp:173-186 [Conf ] John A. MacDonald , William G. Sirett , Chris J. Mitchell Overcoming Channel Bandwidth Constraints in Secure SIM Applications. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:539-550 [Conf ] Adrian Leung , Chris J. Mitchell A Service Discovery Threat Model for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:167-174 [Conf ] Sharon Nachtigal , Chris J. Mitchell Modelling E-Business Security Using Business Processes. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:459-464 [Conf ] Liqun Chen , Dieter Gollmann , Chris J. Mitchell Key Escrow in Mutually Mistrusting Domains. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1996, pp:139-153 [Conf ] Chris J. Mitchell , Paulo S. Pagliusi Is Entity Authentication Necessary? [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2002, pp:20-33 [Conf ] Andreas Pashalidis , Chris J. Mitchell Limits to Anonymity When Using Credentials. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:4-12 [Conf ] Chris J. Mitchell Limits to Anonymity When Using Credentials (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:13-19 [Conf ] Adil Alsaid , Chris J. Mitchell A Scanning Tool for PC Root Public Key Stores. [Citation Graph (0, 0)][DBLP ] WEWoRC, 2005, pp:45-52 [Conf ] Paulo S. Pagliusi , Chris J. Mitchell PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. [Citation Graph (0, 0)][DBLP ] WISA, 2003, pp:135-149 [Conf ] Pita Jarupunphol , Chris J. Mitchell E-commerce and the Media - Influences on Security Risk Perceptions. [Citation Graph (0, 0)][DBLP ] WITASI, 2002, pp:163-174 [Conf ] Chris J. Mitchell Multi-Destination Secure Electronic Mail. [Citation Graph (0, 0)][DBLP ] Comput. J., 1989, v:32, n:1, pp:13-15 [Journal ] Chris J. Mitchell Another Postage Stamp Problem. [Citation Graph (0, 0)][DBLP ] Comput. J., 1989, v:32, n:4, pp:374-376 [Journal ] Chris J. Mitchell , D. Rush , Michael Walker A Secure Messaging Architecture Implementing the X.400-1988 Security Features. [Citation Graph (0, 0)][DBLP ] Comput. J., 1990, v:33, n:4, pp:290-295 [Journal ] Chris J. Mitchell , Vijay Varadharajan Modified forms of cipher block chaining. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:1, pp:37-40 [Journal ] Konstantinos Rantos , Chris J. Mitchell Matching key recovery mechanisms to business requirements. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:3, pp:232-245 [Journal ] Lars R. Knudsen , Chris J. Mitchell Analysis of 3gpp-MAC and Two-key 3gpp-MAC. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2003, v:128, n:1, pp:181-191 [Journal ] Dieter Gollmann , Yongfei Han , Chris J. Mitchell Redundant Integer Representations and Fast Exponentiation. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1996, v:7, n:1-2, pp:135-151 [Journal ] Chris J. Mitchell Constructing c-ary Perfect Factors. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1994, v:4, n:4, pp:341-368 [Journal ] Chris J. Mitchell , Kenneth G. Paterson Decoding Perfect Maps. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1994, v:4, n:1, pp:11-30 [Journal ] Chris J. Mitchell , Fred Piper , Michael Walker , Peter R. Wild Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1996, v:7, n:1-2, pp:101-110 [Journal ] Liqun Chen , Dieter Gollmann , Chris J. Mitchell Distributing Trust Amongst Multiple Authentication Servers. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:4, pp:255-268 [Journal ] Chris J. Mitchell , A. Thomas Standardising Authentication Protocols Based on Public-Key Techniques. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1993, v:2, n:, pp:23-36 [Journal ] Glenn Hurlbert , Chris J. Mitchell , Kenneth G. Paterson On the Existence of de Bruijn Tori with Two by Two Windows. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1996, v:76, n:2, pp:213-230 [Journal ] Philippe Godlewski , Chris J. Mitchell Key-Minimal Crytosystems for Unconditional Secrecy. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1990, v:3, n:1, pp:1-25 [Journal ] Lars R. Knudsen , Chris J. Mitchell Partial Key Recovery Attack Against RMAC. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2005, v:18, n:4, pp:375-389 [Journal ] Chris J. Mitchell Enumerating Boolean Functions of Cryptographic Significance. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1990, v:2, n:3, pp:155-170 [Journal ] Qiang Tang , Chris J. Mitchell Cryptanalysis of a hybrid authentication protocol for large mobile networks. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2006, v:79, n:4, pp:496-501 [Journal ] Chris J. Mitchell De Bruijn Sequences and Perfect Factors. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 1997, v:10, n:2, pp:270-281 [Journal ] Chris J. Mitchell , Kenneth G. Paterson Perfect Factors from Cyclic Codes and Interleaving. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 1998, v:11, n:2, pp:241-264 [Journal ] Chris J. Mitchell , Michael Walker , Peter R. Wild The Combinatorics of Perfect Authentication Schemes. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 1994, v:7, n:1, pp:102-107 [Journal ] Niklas Borselius , Chris J. Mitchell , Aaron Wilson A pragmatic alternative to undetachable signatures. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2002, v:36, n:2, pp:6-11 [Journal ] Niklas Borselius , Chris J. Mitchell , Aaron Wilson On the value of threshold signatures. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2002, v:36, n:4, pp:30-35 [Journal ] Liqun Chen , Dieter Gollmann , Chris J. Mitchell Authentication Using Minimally Trusted Servers. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1997, v:31, n:3, pp:16-28 [Journal ] Chris J. Mitchell Making serial number based authentication robust against loss of state. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2000, v:34, n:3, pp:56-59 [Journal ] Chris J. Mitchell , Liqun Chen Comments on the S/KEY User Authentication Scheme. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1996, v:30, n:4, pp:12-16 [Journal ] Chris J. Mitchell , Chan Yeob Yeun Fixing a Problem in the Helsinki Protocol. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:21-24 [Journal ] John Burns , Chris J. Mitchell Parameter Selection for Server-Aided RSA Computation Schemes. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1994, v:43, n:2, pp:163-174 [Journal ] Chris J. Mitchell Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1992, v:41, n:4, pp:505-507 [Journal ] Chris J. Mitchell Aperiodic and semi-periodic perfect maps. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1995, v:41, n:1, pp:88-95 [Journal ] Chris J. Mitchell On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1998, v:44, n:7, pp:3146-3150 [Journal ] Chris J. Mitchell , Tuvi Etzion , Kenneth G. Paterson A method for constructing decodable de Bruijn sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1996, v:42, n:5, pp:1472-1478 [Journal ] Imad M. Abbadi , Chris J. Mitchell Digital rights management using a mobile phone. [Citation Graph (0, 0)][DBLP ] ICEC, 2007, pp:185-194 [Conf ] Eimear Gallery , Chris J. Mitchell Trusted Mobile Platforms. [Citation Graph (0, 0)][DBLP ] FOSAD, 2007, pp:282-323 [Conf ] Adrian Leung , Chris J. Mitchell Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. [Citation Graph (0, 0)][DBLP ] Ubicomp, 2007, pp:73-90 [Conf ] Chris J. Mitchell , Fred Piper , Peter R. Wild ID-based cryptography using symmetric primitives. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:44, n:1-3, pp:249-262 [Journal ] Jonathan Jedwab , Chris J. Mitchell , Fred Piper , Peter R. Wild Perfect binary arrays and difference sets. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 1994, v:125, n:1-3, pp:241-254 [Journal ] Chris J. Mitchell Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen). [Citation Graph (0, 0)][DBLP ] it - Information Technology, 2006, v:48, n:6, pp:321-0 [Journal ] Security vulnerabilities in DNS and DNSSEC. [Citation Graph (, )][DBLP ] Using Non-adaptive Group Testing to Construct Spy Agent Routes. [Citation Graph (, )][DBLP ] Cryptanalysis of the EPBC Authenticated Encryption Mode. [Citation Graph (, )][DBLP ] Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. [Citation Graph (, )][DBLP ] Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. [Citation Graph (, )][DBLP ] Using GSM to enhance e-commerce security. [Citation Graph (, )][DBLP ] RFID authentication protocol for low-cost tags. [Citation Graph (, )][DBLP ] Addressing privacy issues in CardSpace. [Citation Graph (, )][DBLP ] A Device Management Framework for Secure Ubiquitous Service Delivery. [Citation Graph (, )][DBLP ] A client-side CardSpace-Liberty integration architecture. [Citation Graph (, )][DBLP ] CardSpace-liberty integration for CardSpace users. [Citation Graph (, )][DBLP ] On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). [Citation Graph (, )][DBLP ] Scalable RFID Pseudonym Protocol. [Citation Graph (, )][DBLP ] A fair certification protocol. [Citation Graph (, )][DBLP ] A remark on hash functions for message authentication. [Citation Graph (, )][DBLP ] A security scheme for resource sharing over a network. [Citation Graph (, )][DBLP ] Key storage in secure networks. [Citation Graph (, )][DBLP ] Search in 0.011secs, Finished in 0.016secs