The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chris J. Mitchell: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mark P. Hoyle, Chris J. Mitchell
    On Solutions to the Key Escrow Problem. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:277-306 [Conf]
  2. Karl Brincat, Chris J. Mitchell
    New CBC-MAC Forgery Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:3-14 [Conf]
  3. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Tailoring authentication protocols to match underlying mechanisms. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:121-133 [Conf]
  4. Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild
    Secret Sharing with Reusable Polynomials. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:183-193 [Conf]
  5. Andreas Pashalidis, Chris J. Mitchell
    A Taxonomy of Single Sign-On Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:249-264 [Conf]
  6. Chris J. Mitchell
    Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:560-571 [Conf]
  7. Luciano Rila, Chris J. Mitchell
    Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:254-264 [Conf]
  8. Luciano Rila, Chris J. Mitchell
    Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2002, pp:- [Conf]
  9. Qiang Tang, Chris J. Mitchell
    On the Security of Some Password-Based Key Agreement Schemes. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:149-154 [Conf]
  10. Qiang Tang, Chris J. Mitchell
    Efficient Compilers for Authenticated Group Key Exchange. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:192-197 [Conf]
  11. Sattam S. Al-Riyami, Chris J. Mitchell
    Renewing crytographic timestamps. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:9-16 [Conf]
  12. Chris J. Mitchell, Namhyun Hur
    On the security of a structural proven signer ordering multisignature scheme. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:1-8 [Conf]
  13. Nigel Jefferies, Chris J. Mitchell, Michael Walker
    A Proposed Architecture for Trusted Third Party Services. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:98-104 [Conf]
  14. Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell
    Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:184-196 [Conf]
  15. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Key distribution without individual trusted authentification servers. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:30-0 [Conf]
  16. Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell
    Panel Introduction: The Security Impact of Distributed Computing Technologies. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:164-166 [Conf]
  17. Niklas Borselius, Chris J. Mitchell
    Securing FIPA Agent Communication. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:135-141 [Conf]
  18. Georgios Kalogridis, Chris J. Mitchell, Gary Clemo
    Spy Agents: Evaluating Trust in Remote Environments. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:405-411 [Conf]
  19. Mansour A. Al-Meaither, Chris J. Mitchell
    A Secure Electronic Payment Scheme for Charity Donations. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:50-61 [Conf]
  20. Vorapranee Khu-smith, Chris J. Mitchell
    Using EMV Cards to Protect E-commerce Transactions. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2002, pp:388-399 [Conf]
  21. Vorapranee Khu-smith, Chris J. Mitchell
    Enhancing E-commerce Security Using GSM Authentication. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:72-83 [Conf]
  22. Philippe Godlewski, Chris J. Mitchell
    Key Minimal Authentication Systems for Unconditional Secrecy. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:497-501 [Conf]
  23. Adil Alsaid, Chris J. Mitchell
    Installing Fake Root Keys in a PC. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:227-239 [Conf]
  24. Andreas Pashalidis, Chris J. Mitchell
    Using EMV Cards for Single Sign-On. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:205-217 [Conf]
  25. Geraint Price, Chris J. Mitchell
    Interoperation Between a Conventional PKI and an ID-Based Infrastructure. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:73-85 [Conf]
  26. Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, Chris J. Mitchell
    Analysis of the Bit-Search Generator and Sequence Compression Techniques. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:196-214 [Conf]
  27. Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell
    Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:299-319 [Conf]
  28. Pita Jarupunphol, Chris J. Mitchell
    Implementation Aspects of SET/EMV. [Citation Graph (0, 0)][DBLP]
    I3E, 2002, pp:305-315 [Conf]
  29. Liqun Chen, Chris J. Mitchell
    An anonymous and undeniable payment scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:478-482 [Conf]
  30. Qiang Tang, Chris J. Mitchell
    Security Properties of Two Authenticated Conference Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:304-314 [Conf]
  31. Vorapranee Khu-smith, Chris J. Mitchell
    Enhancing the Security of Cookies. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:132-145 [Conf]
  32. Andreas Pashalidis, Chris J. Mitchell
    A Security Model for Anonymous Credential Systems. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:183-198 [Conf]
  33. Niklas Borselius, Chris J. Mitchell, Aaron Wilson
    Undetachable Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:239-244 [Conf]
  34. Karl Brincat, Chris J. Mitchell
    Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:63-72 [Conf]
  35. Chris J. Mitchell
    Remote User Authentication Using Public Information. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:360-369 [Conf]
  36. Chris J. Mitchell
    Partial Key Recovery Attacks on XCBC, TMAC and OMAC. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:155-167 [Conf]
  37. Yongfei Han, Dieter Gollmann, Chris J. Mitchell
    Minimal Weight k-SR Representations. [Citation Graph (0, 0)][DBLP]
    IMA Conf., 1995, pp:34-43 [Conf]
  38. Chris J. Mitchell
    A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels. [Citation Graph (0, 0)][DBLP]
    IMA Conf., 1995, pp:84-93 [Conf]
  39. Konstantinos Rantos, Chris J. Mitchell
    Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:268-276 [Conf]
  40. Keith M. Martin, Bart Preneel, Chris J. Mitchell, Hans-Joachim Hitz, Günther Horn, A. Poliakova, P. Howard
    Secure Billing for Mobile Information Services in UMTS. [Citation Graph (0, 0)][DBLP]
    IS&N, 1998, pp:535-548 [Conf]
  41. Chris J. Mitchell
    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:244-258 [Conf]
  42. Andreas Pashalidis, Chris J. Mitchell
    Single Sign-On Using Trusted Platforms. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:54-68 [Conf]
  43. Shenglan Hu, Chris J. Mitchell
    Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:83-92 [Conf]
  44. Niklas Borselius, Chris J. Mitchell, Aaron Wilson
    On Mobile Agent Based Transactions in Moderately Hostile Environments. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:173-186 [Conf]
  45. John A. MacDonald, William G. Sirett, Chris J. Mitchell
    Overcoming Channel Bandwidth Constraints in Secure SIM Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:539-550 [Conf]
  46. Adrian Leung, Chris J. Mitchell
    A Service Discovery Threat Model for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:167-174 [Conf]
  47. Sharon Nachtigal, Chris J. Mitchell
    Modelling E-Business Security Using Business Processes. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:459-464 [Conf]
  48. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Key Escrow in Mutually Mistrusting Domains. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:139-153 [Conf]
  49. Chris J. Mitchell, Paulo S. Pagliusi
    Is Entity Authentication Necessary? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:20-33 [Conf]
  50. Andreas Pashalidis, Chris J. Mitchell
    Limits to Anonymity When Using Credentials. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:4-12 [Conf]
  51. Chris J. Mitchell
    Limits to Anonymity When Using Credentials (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:13-19 [Conf]
  52. Adil Alsaid, Chris J. Mitchell
    A Scanning Tool for PC Root Public Key Stores. [Citation Graph (0, 0)][DBLP]
    WEWoRC, 2005, pp:45-52 [Conf]
  53. Paulo S. Pagliusi, Chris J. Mitchell
    PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:135-149 [Conf]
  54. Pita Jarupunphol, Chris J. Mitchell
    E-commerce and the Media - Influences on Security Risk Perceptions. [Citation Graph (0, 0)][DBLP]
    WITASI, 2002, pp:163-174 [Conf]
  55. Chris J. Mitchell
    Multi-Destination Secure Electronic Mail. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1989, v:32, n:1, pp:13-15 [Journal]
  56. Chris J. Mitchell
    Another Postage Stamp Problem. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1989, v:32, n:4, pp:374-376 [Journal]
  57. Chris J. Mitchell, D. Rush, Michael Walker
    A Secure Messaging Architecture Implementing the X.400-1988 Security Features. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1990, v:33, n:4, pp:290-295 [Journal]
  58. Chris J. Mitchell, Vijay Varadharajan
    Modified forms of cipher block chaining. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:1, pp:37-40 [Journal]
  59. Konstantinos Rantos, Chris J. Mitchell
    Matching key recovery mechanisms to business requirements. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:3, pp:232-245 [Journal]
  60. Lars R. Knudsen, Chris J. Mitchell
    Analysis of 3gpp-MAC and Two-key 3gpp-MAC. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2003, v:128, n:1, pp:181-191 [Journal]
  61. Dieter Gollmann, Yongfei Han, Chris J. Mitchell
    Redundant Integer Representations and Fast Exponentiation. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:135-151 [Journal]
  62. Chris J. Mitchell
    Constructing c-ary Perfect Factors. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1994, v:4, n:4, pp:341-368 [Journal]
  63. Chris J. Mitchell, Kenneth G. Paterson
    Decoding Perfect Maps. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1994, v:4, n:1, pp:11-30 [Journal]
  64. Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild
    Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:101-110 [Journal]
  65. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Distributing Trust Amongst Multiple Authentication Servers. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:4, pp:255-268 [Journal]
  66. Chris J. Mitchell, A. Thomas
    Standardising Authentication Protocols Based on Public-Key Techniques. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:, pp:23-36 [Journal]
  67. Glenn Hurlbert, Chris J. Mitchell, Kenneth G. Paterson
    On the Existence of de Bruijn Tori with Two by Two Windows. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1996, v:76, n:2, pp:213-230 [Journal]
  68. Philippe Godlewski, Chris J. Mitchell
    Key-Minimal Crytosystems for Unconditional Secrecy. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1990, v:3, n:1, pp:1-25 [Journal]
  69. Lars R. Knudsen, Chris J. Mitchell
    Partial Key Recovery Attack Against RMAC. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:4, pp:375-389 [Journal]
  70. Chris J. Mitchell
    Enumerating Boolean Functions of Cryptographic Significance. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1990, v:2, n:3, pp:155-170 [Journal]
  71. Qiang Tang, Chris J. Mitchell
    Cryptanalysis of a hybrid authentication protocol for large mobile networks. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:4, pp:496-501 [Journal]
  72. Chris J. Mitchell
    De Bruijn Sequences and Perfect Factors. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 1997, v:10, n:2, pp:270-281 [Journal]
  73. Chris J. Mitchell, Kenneth G. Paterson
    Perfect Factors from Cyclic Codes and Interleaving. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 1998, v:11, n:2, pp:241-264 [Journal]
  74. Chris J. Mitchell, Michael Walker, Peter R. Wild
    The Combinatorics of Perfect Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 1994, v:7, n:1, pp:102-107 [Journal]
  75. Niklas Borselius, Chris J. Mitchell, Aaron Wilson
    A pragmatic alternative to undetachable signatures. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:2, pp:6-11 [Journal]
  76. Niklas Borselius, Chris J. Mitchell, Aaron Wilson
    On the value of threshold signatures. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:4, pp:30-35 [Journal]
  77. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Authentication Using Minimally Trusted Servers. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1997, v:31, n:3, pp:16-28 [Journal]
  78. Chris J. Mitchell
    Making serial number based authentication robust against loss of state. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2000, v:34, n:3, pp:56-59 [Journal]
  79. Chris J. Mitchell, Liqun Chen
    Comments on the S/KEY User Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1996, v:30, n:4, pp:12-16 [Journal]
  80. Chris J. Mitchell, Chan Yeob Yeun
    Fixing a Problem in the Helsinki Protocol. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1998, v:32, n:4, pp:21-24 [Journal]
  81. John Burns, Chris J. Mitchell
    Parameter Selection for Server-Aided RSA Computation Schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1994, v:43, n:2, pp:163-174 [Journal]
  82. Chris J. Mitchell
    Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1992, v:41, n:4, pp:505-507 [Journal]
  83. Chris J. Mitchell
    Aperiodic and semi-periodic perfect maps. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1995, v:41, n:1, pp:88-95 [Journal]
  84. Chris J. Mitchell
    On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:7, pp:3146-3150 [Journal]
  85. Chris J. Mitchell, Tuvi Etzion, Kenneth G. Paterson
    A method for constructing decodable de Bruijn sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1996, v:42, n:5, pp:1472-1478 [Journal]
  86. Imad M. Abbadi, Chris J. Mitchell
    Digital rights management using a mobile phone. [Citation Graph (0, 0)][DBLP]
    ICEC, 2007, pp:185-194 [Conf]
  87. Eimear Gallery, Chris J. Mitchell
    Trusted Mobile Platforms. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:282-323 [Conf]
  88. Adrian Leung, Chris J. Mitchell
    Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    Ubicomp, 2007, pp:73-90 [Conf]
  89. Chris J. Mitchell, Fred Piper, Peter R. Wild
    ID-based cryptography using symmetric primitives. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2007, v:44, n:1-3, pp:249-262 [Journal]
  90. Jonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild
    Perfect binary arrays and difference sets. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1994, v:125, n:1-3, pp:241-254 [Journal]
  91. Chris J. Mitchell
    Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen). [Citation Graph (0, 0)][DBLP]
    it - Information Technology, 2006, v:48, n:6, pp:321-0 [Journal]

  92. Security vulnerabilities in DNS and DNSSEC. [Citation Graph (, )][DBLP]


  93. Using Non-adaptive Group Testing to Construct Spy Agent Routes. [Citation Graph (, )][DBLP]


  94. Cryptanalysis of the EPBC Authenticated Encryption Mode. [Citation Graph (, )][DBLP]


  95. Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. [Citation Graph (, )][DBLP]


  96. Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. [Citation Graph (, )][DBLP]


  97. Using GSM to enhance e-commerce security. [Citation Graph (, )][DBLP]


  98. RFID authentication protocol for low-cost tags. [Citation Graph (, )][DBLP]


  99. Addressing privacy issues in CardSpace. [Citation Graph (, )][DBLP]


  100. A Device Management Framework for Secure Ubiquitous Service Delivery. [Citation Graph (, )][DBLP]


  101. A client-side CardSpace-Liberty integration architecture. [Citation Graph (, )][DBLP]


  102. CardSpace-liberty integration for CardSpace users. [Citation Graph (, )][DBLP]


  103. On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). [Citation Graph (, )][DBLP]


  104. Scalable RFID Pseudonym Protocol. [Citation Graph (, )][DBLP]


  105. A fair certification protocol. [Citation Graph (, )][DBLP]


  106. A remark on hash functions for message authentication. [Citation Graph (, )][DBLP]


  107. A security scheme for resource sharing over a network. [Citation Graph (, )][DBLP]


  108. Key storage in secure networks. [Citation Graph (, )][DBLP]


Search in 0.117secs, Finished in 0.124secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002