


default search action
Chris J. Mitchell
Person information
- affiliation: Royal Holloway, University of London, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i38]Haitham S. Al-Sinani, Chris J. Mitchell:
PenTest++: Elevating Ethical Hacking with AI and Automation. CoRR abs/2502.09484 (2025) - [i37]Haitham S. Al-Sinani, Chris J. Mitchell:
From Content Creation to Citation Inflation: A GenAI Case Study. CoRR abs/2503.23414 (2025) - 2024
- [j75]Abbas Alhakim
, Chris J. Mitchell
, Janusz Szmidt
, Peter R. Wild
:
Orientable sequences over non-binary alphabets. Cryptogr. Commun. 16(6): 1309-1326 (2024) - [c104]Haitham S. Al-Sinani
, Chris J. Mitchell
, Nabil Sahli
, Mohamed Al-Siyabi:
Unleashing AI in Ethical Hacking. STM 2024: 140-151 - [i36]Chris J. Mitchell:
Integrity-protecting block cipher modes - Untangling a tangled web. CoRR abs/2403.03654 (2024) - [i35]Chris J. Mitchell, Peter R. Wild:
Orientable and negative orientable sequences. CoRR abs/2409.00672 (2024) - [i34]Haitham S. Al-Sinani, Chris J. Mitchell:
AI-Enhanced Ethical Hacking: A Linux-Focused Experiment. CoRR abs/2410.05105 (2024) - [i33]Chris J. Mitchell, Peter R. Wild:
Special orientable sequences. CoRR abs/2411.17273 (2024) - [i32]Haitham S. Al-Sinani, Chris J. Mitchell:
AI-Augmented Ethical Hacking: A Practical Examination of Manual Exploitation and Privilege Escalation in Linux Environments. CoRR abs/2411.17539 (2024) - 2023
- [j74]Tomer Ashur, Chris J. Mitchell:
Special Issue on Failed Approaches and Insightful Losses in Cryptology - Foreword. Comput. J. 66(6): 1311 (2023) - 2022
- [j73]Chris J. Mitchell
, Peter R. Wild
:
Constructing Orientable Sequences. IEEE Trans. Inf. Theory 68(7): 4782-4789 (2022) - 2021
- [j72]Maryam Mehrnezhad
, Thyla van der Merwe, Chris J. Mitchell:
Guest Editorial: Security and Privacy. IEEE Commun. Stand. Mag. 5(3): 10-11 (2021) - [j71]Chris J. Mitchell
:
How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes. IET Inf. Secur. 15(3): 223-230 (2021) - [j70]Chris J. Mitchell:
Yet another insecure group key distribution scheme using secret sharing. J. Inf. Secur. Appl. 57: 102713 (2021) - [c103]Marc Sel
, Chris J. Mitchell
:
Automating the Evaluation of Trustworthiness. TrustBus 2021: 18-31 - [c102]Gaëtan Pradel, Chris J. Mitchell:
Privacy-Preserving Biometric Matching Using Homomorphic Encryption. TrustCom 2021: 494-505 - [e14]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8661-6 [contents] - [i31]Chris J. Mitchell:
The (in)security of some recently proposed lightweight key distribution schemes. CoRR abs/2101.08132 (2021) - [i30]Gaëtan Pradel, Chris J. Mitchell:
Privacy-Preserving Biometric Matching Using Homomorphic Encryption. CoRR abs/2111.12372 (2021) - 2020
- [j69]Chris J. Mitchell
:
The impact of quantum computing on real-world security: A 5G case study. Comput. Secur. 93: 101825 (2020) - [c101]Gaëtan Pradel, Chris J. Mitchell:
Post-quantum Certificates for Electronic Travel Documents. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 56-73 - [c100]Wanpeng Li
, Chris J. Mitchell:
User Access Privacy in OAuth 2.0 and OpenID Connect. EuroS&P Workshops 2020: 664-672 - [e13]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, Virtual Event, USA, November, 2020. ACM 2020, ISBN 978-1-4503-8091-1 [contents] - [e12]Thyla van der Merwe
, Chris J. Mitchell
, Maryam Mehrnezhad
:
Security Standardisation Research - 6th International Conference, SSR 2020, London, UK, November 30 - December 1, 2020, Proceedings. Lecture Notes in Computer Science 12529, Springer 2020, ISBN 978-3-030-64356-0 [contents] - [i29]Chris J. Mitchell:
Yet another insecure group key distribution scheme using secret sharing. CoRR abs/2003.14356 (2020) - [i28]Chris J. Mitchell:
How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes. CoRR abs/2004.05597 (2020) - [i27]Chris J. Mitchell:
Who Needs Trust for 5G? CoRR abs/2005.00862 (2020) - [i26]Chris J. Mitchell:
How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure. CoRR abs/2005.04434 (2020) - [i25]Chris J. Mitchell:
Provably insecure group authentication: Not all security proofs are what they claim to be. CoRR abs/2005.05376 (2020) - [i24]Chris J. Mitchell:
An insecure noninteractive group key establishment scheme. CoRR abs/2009.09278 (2020)
2010 – 2019
- 2019
- [j68]Chris J. Mitchell
:
Security issues in a group key establishment protocol. Comput. J. 62(3): 373-376 (2019) - [c99]Wanpeng Li
, Chris J. Mitchell, Thomas M. Chen:
OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect. SSR 2019: 35-44 - [e11]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6840-7 [contents] - [i23]Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect. CoRR abs/1901.08960 (2019) - [i22]Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J. Mitchell:
Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking. CoRR abs/1905.09581 (2019) - [i21]Chris J. Mitchell:
The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure. CoRR abs/1906.09330 (2019) - [i20]Chris J. Mitchell:
The impact of quantum computing on real-world security: A 5G case study. CoRR abs/1911.07583 (2019) - 2018
- [j67]Liqun Chen
, Jinguang Han
, Chris J. Mitchell:
Message from the Guest Editors. Int. J. Inf. Sec. 17(5): 491-492 (2018) - [c98]Fatma Al Maqbali, Chris J. Mitchell
:
Email-based Password Recovery - Risking or Rescuing Users? ICCST 2018: 1-5 - [c97]Nasser Mohammed Al-Fannah, Wanpeng Li
, Chris J. Mitchell
:
Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking. ISC 2018: 481-501 - [c96]Wanpeng Li
, Chris J. Mitchell
, Thomas M. Chen
:
Mitigating CSRF attacks on OAuth 2.0 Systems. PST 2018: 1-5 - [c95]Wanpeng Li
, Chris J. Mitchell, Thomas M. Chen
:
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations. Security Protocols Workshop 2018: 24-41 - [i19]Fatma Al Maqbali, Chris J. Mitchell:
Web password recovery - a necessary evil? CoRR abs/1801.06730 (2018) - [i18]Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect. CoRR abs/1801.07983 (2018) - [i17]Chris J. Mitchell:
Security issues in a group key establishment protocol. CoRR abs/1803.01137 (2018) - [i16]Chris J. Mitchell:
The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure. CoRR abs/1803.05365 (2018) - 2017
- [c94]Fatma Al Maqbali, Chris J. Mitchell
:
AutoPass: An automatic password generator. ICCST 2017: 1-6 - [c93]Mohammed Shafiul Alam Khan, Chris J. Mitchell:
Trashing IMSI catchers in mobile networks. WISEC 2017: 207-218 - [e10]Giovanni Livraga, Chris J. Mitchell:
Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings. Lecture Notes in Computer Science 10547, Springer 2017, ISBN 978-3-319-68062-0 [contents] - [i15]Fatma Al Maqbali, Chris J. Mitchell:
AutoPass: An Automatic Password Generator. CoRR abs/1703.01959 (2017) - 2016
- [j66]Dieter Jungnickel, Jennifer D. Key, Chris J. Mitchell
, Ronald C. Mullin, Peter R. Wild:
Editorial for the 25th anniversary issue. Des. Codes Cryptogr. 78(1): 1-3 (2016) - [j65]Liqun Chen
, Chris J. Mitchell
:
Message from the guest editors. Int. J. Inf. Sec. 15(6): 573-574 (2016) - [j64]Chris J. Mitchell
:
On the Security of 2-Key Triple DES. IEEE Trans. Inf. Theory 62(11): 6260-6267 (2016) - [c92]Wanpeng Li
, Chris J. Mitchell:
Analysing the Security of Google's Implementation of OpenID Connect. DIMVA 2016: 357-376 - [c91]Mohammed Shafiul Alam Khan, Chris J. Mitchell
:
Retrofitting Mutual Authentication to GSM Using RAND Hijacking. STM 2016: 17-31 - [c90]Fatma Al Maqbali, Chris J. Mitchell
:
Password Generators: Old Ideas and New. WISTP 2016: 245-253 - [e9]Lidong Chen, David A. McGrew, Chris J. Mitchell:
Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Lecture Notes in Computer Science 10074, Springer 2016, ISBN 978-3-319-49099-1 [contents] - [i14]Chris J. Mitchell:
On the security of 2-key triple DES. CoRR abs/1602.06229 (2016) - [i13]Mohammed Shafiul Alam Khan, Chris J. Mitchell:
Retrofitting mutual authentication to GSM using RAND hijacking. CoRR abs/1607.00729 (2016) - [i12]Fatma Al Maqbali, Chris J. Mitchell:
Password Generators: Old Ideas and New. CoRR abs/1607.04421 (2016) - 2015
- [c89]Wanpeng Li
, Chris J. Mitchell:
Addressing Threats to Real-World Identity Management Systems. ISSE 2015: 251-259 - [c88]Mohammed Shafiul Alam Khan, Chris J. Mitchell
:
Improving Air Interface User Privacy in Mobile Telephony. SSR 2015: 165-184 - [c87]Mwawi Nyirenda Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li
, Chris J. Mitchell
, Po-Wah Yau:
Generating Unlinkable IPv6 Addresses. SSR 2015: 185-199 - [e8]Javier López, Chris J. Mitchell:
Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings. Lecture Notes in Computer Science 9290, Springer 2015, ISBN 978-3-319-23317-8 [contents] - [i11]Mohammed Shafiul Alam Khan, Chris J. Mitchell:
Improving Air Interface User Privacy in Mobile Telephony. CoRR abs/1504.03287 (2015) - [i10]Wanpeng Li, Chris J. Mitchell:
Analysing the Security of Google's implementation of OpenID Connect. CoRR abs/1508.01707 (2015) - 2014
- [c86]Mohammed Shafiul Alam Khan, Chris J. Mitchell
:
Another Look at Privacy Threats in 3G Mobile Telephony. ACISP 2014: 386-396 - [c85]Wanpeng Li
, Chris J. Mitchell
:
Security Issues in OAuth 2.0 SSO Implementations. ISC 2014: 529-541 - [e7]Liqun Chen
, Chris J. Mitchell
:
Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings. Lecture Notes in Computer Science 8893, Springer 2014, ISBN 978-3-319-14053-7 [contents] - 2013
- [j63]Chunhua Chen, Chris J. Mitchell
, Shaohua Tang:
Ubiquitous One-Time Password Service Using the Generic Authentication Architecture. Mob. Networks Appl. 18(5): 738-747 (2013) - [j62]Haitham S. Al-Sinani
, Chris J. Mitchell
:
Enabling interoperation between Shibboleth and Information Card systems. Secur. Commun. Networks 6(2): 219-229 (2013) - [c84]Chris J. Mitchell
:
Analysing the IOBC Authenticated Encryption Mode. ACISP 2013: 1-12 - [e6]Sabrina De Capitani di Vimercati, Chris J. Mitchell
:
Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7868, Springer 2013, ISBN 978-3-642-40011-7 [contents] - [e5]Simone Fischer-Hübner, Elisabeth de Leeuw, Chris J. Mitchell
:
Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. IFIP Advances in Information and Communication Technology 396, Springer 2013, ISBN 978-3-642-37281-0 [contents] - 2012
- [j61]Gina Kounga, Chris J. Mitchell
, Thomas Walter:
Generating certification authority authenticated public keys in ad hoc networks. Secur. Commun. Networks 5(1): 87-106 (2012) - [c83]Chunhua Chen, Shaohua Tang, Chris J. Mitchell
:
Building General-Purpose Security Services on EMV Payment Cards. SecureComm 2012: 29-44 - [e4]Chris J. Mitchell
, Allan Tomlinson:
Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings. Lecture Notes in Computer Science 7711, Springer 2012, ISBN 978-3-642-35370-3 [contents] - 2011
- [j60]Boyeon Song, Chris J. Mitchell
:
Scalable RFID security protocols supporting tag ownership transfer. Comput. Commun. 34(4): 556-566 (2011) - [c82]Haitham S. Al-Sinani, Chris J. Mitchell
:
Enhancing CardSpace Authentication Using a Mobile Device. DBSec 2011: 201-216 - [c81]Haitham S. Al-Sinani
, Chris J. Mitchell
:
A Universal Client-Based Identity Management Tool. EuroPKI 2011: 49-74 - [c80]Chunhua Chen, Chris J. Mitchell
, Shaohua Tang:
Building General Purpose Security Services on Trusted Computing. INTRUST 2011: 16-31 - [c79]Haitham S. Al-Sinani, Chris J. Mitchell
:
Client-Based CardSpace-OpenID Interoperation. ISCIS 2011: 387-393 - [c78]Haitham S. Al-Sinani, Chris J. Mitchell
:
Extending the Scope of cardspace. SIN 2011: 235-238 - [c77]Chunhua Chen, Chris J. Mitchell
, Shaohua Tang:
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key. WISTP 2011: 54-68 - 2010
- [j59]Liqun Chen
, Chris J. Mitchell
:
Parsing ambiguities in authentication and key establishment protocols. Int. J. Electron. Secur. Digit. Forensics 3(1): 82-94 (2010) - [c76]Waleed A. Alrodhan, Chris J. Mitchell
:
Enhancing user authentication in claim-based identity management. CTS 2010: 75-83 - [c75]Haitham S. Al-Sinani, Chris J. Mitchell
:
Using CardSpace as a Password Manager. IDMAN 2010: 18-30 - [c74]Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J. Mitchell
:
CardSpace-liberty integration for CardSpace users. IDtrust 2010: 12-25
2000 – 2009
- 2009
- [j58]Eimear Gallery, Chris J. Mitchell
:
Trusted Computing: Security and Applications. Cryptologia 33(3): 217-245 (2009) - [j57]Waleed A. Alrodhan, Chris J. Mitchell
:
Improving the Security of CardSpace. EURASIP J. Inf. Secur. 2009 (2009) - [c73]Boyeon Song, Chris J. Mitchell
:
Scalable RFID Pseudonym Protocol. NSS 2009: 216-224 - [c72]Chris J. Mitchell
:
A Novel Stateless Authentication Protocol. Security Protocols Workshop 2009: 269-274 - [c71]Chris J. Mitchell
:
A Novel Stateless Authentication Protocol. Security Protocols Workshop 2009: 275-281 - [e3]Sihan Qing, Chris J. Mitchell
, Guilin Wang:
Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings. Lecture Notes in Computer Science 5927, Springer 2009, ISBN 978-3-642-11144-0 [contents] - [e2]Liqun Chen, Chris J. Mitchell
, Andrew P. Martin:
Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings. Lecture Notes in Computer Science 5471, Springer 2009, ISBN 978-3-642-00586-2 [contents] - [e1]Olivier Markowitch, Angelos Bilas
, Jaap-Henk Hoepman, Chris J. Mitchell
, Jean-Jacques Quisquater:
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings. Lecture Notes in Computer Science 5746, Springer 2009, ISBN 978-3-642-03943-0 [contents] - 2008
- [j56]Shane Balfe, Eimear Gallery, Chris J. Mitchell
, Kenneth G. Paterson:
Challenges for Trusted Computing. IEEE Secur. Priv. 6(6): 60-66 (2008) - [c70]Georgios Kalogridis, Chris J. Mitchell
:
Using Non-adaptive Group Testing to Construct Spy Agent Routes. ARES 2008: 1013-1019 - [c69]Adrian Leung, Chris J. Mitchell
:
A Device Management Framework for Secure Ubiquitous Service Delivery. IAS 2008: 267-274 - [c68]Waleed A. Alrodhan, Chris J. Mitchell
:
A client-side CardSpace-Liberty integration architecture. IDtrust 2008: 1-7 - [c67]Adrian Leung, Liqun Chen
, Chris J. Mitchell
:
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). TRUST 2008: 179-190 - [c66]Boyeon Song, Chris J. Mitchell
:
RFID authentication protocol for low-cost tags. WISEC 2008: 140-147 - [i9]Liqun Chen, Chris J. Mitchell:
Parsing ambiguities in authentication and key establishment protocols. IACR Cryptol. ePrint Arch. 2008: 419 (2008) - 2007
- [j55]Chris J. Mitchell
, Fred Piper, Peter R. Wild:
ID-based cryptography using symmetric primitives. Des. Codes Cryptogr. 44(1-3): 249-262 (2007) - [c65]Imad M. Abbadi, Chris J. Mitchell
:
Digital rights management using a mobile phone. ICEC 2007: 185-194 - [c64]Suranjith Ariyapperuma, Chris J. Mitchell
:
Security vulnerabilities in DNS and DNSSEC. ARES 2007: 335-342 - [c63]Waleed A. Alrodhan, Chris J. Mitchell
:
Addressing privacy issues in CardSpace. IAS 2007: 285-291 - [c62]Eimear Gallery, Chris J. Mitchell
:
Trusted Mobile Platforms. FOSAD 2007: 282-323 - [c61]Adrian Leung, Chris J. Mitchell
:
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. UbiComp 2007: 73-90 - [c60]Chris J. Mitchell
:
Cryptanalysis of the EPBC Authenticated Encryption Mode. IMACC 2007: 118-128 - 2006
- [j54]Chris J. Mitchell
:
Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen). it Inf. Technol. 48(6): 321- (2006) - [j53]Qiang Tang
, Chris J. Mitchell
:
Cryptanalysis of a hybrid authentication protocol for large mobile networks. J. Syst. Softw. 79(4): 496-501 (2006) - [c59]Adrian Leung, Chris J. Mitchell:
A Service Discovery Threat Model for Ad Hoc Networks. SECRYPT 2006: 167-174 - [c58]Sharon Nachtigal, Chris J. Mitchell:
Modelling E-Business Security Using Business Processes. SECRYPT 2006: 459-464 - [c57]Chris J. Mitchell
:
Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. Security Protocols Workshop 2006: 164-170 - [c56]Chris J. Mitchell
:
Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. Security Protocols Workshop 2006: 171-176 - 2005
- [j52]Konstantinos Rantos
, Chris J. Mitchell
:
Matching key recovery mechanisms to business requirements. Comput. Secur. 24(3): 232-245 (2005) - [j51]Qiang Tang
, Chris J. Mitchell
:
Comments on a cryptographic key assignment scheme. Comput. Stand. Interfaces 27(3): 323-326 (2005) - [j50]Qiang Tang
, Chris J. Mitchell
:
Comments on two anonymous conference key distribution systems. Comput. Stand. Interfaces 27(4): 397-400 (2005) - [j49]Anand S. Gajparia, Chris J. Mitchell
, Chan Yeob Yeun
:
Supporting User Privacy in Location Based Services. IEICE Trans. Commun. 88-B(7): 2837-2847 (2005) - [j48]Adil Alsaid, Chris J. Mitchell
:
Dynamic content attacks on digital signatures. Inf. Manag. Comput. Security 13(4): 328-336 (2005) - [j47]Lars R. Knudsen, Chris J. Mitchell
:
Partial Key Recovery Attack Against RMAC. J. Cryptol. 18(4): 375-389 (2005) - [c55]Chris J. Mitchell
:
Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. ACISP 2005: 560-571 - [c54]Qiang Tang, Chris J. Mitchell
:
On the Security of Some Password-Based Key Agreement Schemes. CIS (2) 2005: 149-154 - [c53]Qiang Tang, Chris J. Mitchell
:
Efficient Compilers for Authenticated Group Key Exchange. CIS (2) 2005: 192-197 - [c52]Georgios Kalogridis, Chris J. Mitchell, Gary Clemo:
Spy Agents: Evaluating Trust in Remote Environments. Security and Management 2005: 405-411 - [c51]Geraint Price, Chris J. Mitchell
:
Interoperation Between a Conventional PKI and an ID-Based Infrastructure. EuroPKI 2005: 73-85 - [c50]Adil Alsaid, Chris J. Mitchell
:
Installing Fake Root Keys in a PC. EuroPKI 2005: 227-239 - [c49]Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas T. Courtois, Blandine Debraize, Chris J. Mitchell
:
Analysis of the Bit-Search Generator and Sequence Compression Techniques. FSE 2005: 196-214 - [c48]Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell
:
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. FSE 2005: 299-319 - [c47]Qiang Tang, Chris J. Mitchell
:
Security Properties of Two Authenticated Conference Key Agreement Protocols. ICICS 2005: 304-314 - [c46]Chris J. Mitchell
:
Partial Key Recovery Attacks on XCBC, TMAC and OMAC. IMACC 2005: 155-167 - [c45]Chris J. Mitchell
:
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? ISC 2005: 244-258 - [c44]Shenglan Hu, Chris J. Mitchell
:
Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling. MSN 2005: 83-92 - [c43]John A. MacDonald, William G. Sirett, Chris J. Mitchell:
Overcoming Channel Bandwidth Constraints in Secure SIM Applications. SEC 2005: 539-550 - [c42]Adil Alsaid, Chris J. Mitchell:
A Scanning Tool for PC Root Public Key Stores. WEWoRC 2005: 45-52 - [i8]Qiang Tang
, Chris J. Mitchell:
Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme. IACR Cryptol. ePrint Arch. 2005: 47 (2005) - [i7]Qiang Tang
, Chris J. Mitchell:
Cryptanalysis of two identification schemes based on an ID-based cryptosystem. IACR Cryptol. ePrint Arch. 2005: 48 (2005) - [i6]Qiang Tang
, Chris J. Mitchell:
Enhanced password-based key establishment protocol. IACR Cryptol. ePrint Arch. 2005: 141 (2005) - [i5]Qiang Tang
, Chris J. Mitchell:
On the security of some password-based key agreement schemes. IACR Cryptol. ePrint Arch. 2005: 156 (2005) - [i4]Qiang Tang
, Chris J. Mitchell:
Weaknesses in a leakage-resilient authenticated key transport protocol. IACR Cryptol. ePrint Arch. 2005: 173 (2005) - [i3]Qiang Tang
, Chris J. Mitchell:
Security properties of two provably secure conference key agreement protocols. IACR Cryptol. ePrint Arch. 2005: 185 (2005) - [i2]Qiang Tang
, Chris J. Mitchell:
Efficient Compilers for Authenticated Group Key Exchange. IACR Cryptol. ePrint Arch. 2005: 366 (2005) - 2004
- [j46]Siaw-Lynn Ng, Chris J. Mitchell
:
Comments on mutual authentication and key exchange protocols for low power wireless communications. IEEE Commun. Lett. 8(4): 262-263 (2004) - [c41]Andreas Pashalidis, Chris J. Mitchell
:
Using EMV Cards for Single Sign-On. EuroPKI 2004: 205-217 - [c40]Andreas Pashalidis, Chris J. Mitchell:
Impostor: a single sign-on system for use from untrusted devices. GLOBECOM 2004: 2191-2195 - [c39]Andreas Pashalidis, Chris J. Mitchell
:
A Security Model for Anonymous Credential Systems. International Information Security Workshops 2004: 183-198 - [c38]Andreas Pashalidis, Chris J. Mitchell
:
Limits to Anonymity When Using Credentials. Security Protocols Workshop 2004: 4-12 - [c37]Chris J. Mitchell
:
Limits to Anonymity When Using Credentials (Transcript of Discussion). Security Protocols Workshop 2004: 13-19 - [i1]Qiang Tang
, Chris J. Mitchell:
Rethinking the security of some authenticated group key agreement schemes. IACR Cryptol. ePrint Arch. 2004: 363 (2004) - 2003
- [j45]Chien-Lung Hsu, Tzong-Sun Wu, Tzong-Chen Wu, Chris J. Mitchell
:
Improvement of modified authenticated key agreement protocol. Appl. Math. Comput. 142(2-3): 305-308 (2003) - [j44]Lars R. Knudsen, Chris J. Mitchell
:
Analysis of 3gpp-MAC and Two-key 3gpp-MAC. Discret. Appl. Math. 128(1): 181-191 (2003) - [c36]Andreas Pashalidis, Chris J. Mitchell
:
A Taxonomy of Single Sign-On Systems. ACISP 2003: 249-264 - [c35]Luciano Rila, Chris J. Mitchell
:
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. ACNS 2003: 254-264 - [c34]Mansour A. Al-Meaither, Chris J. Mitchell:
A Secure Electronic Murabaha Transaction. Bled eConference 2003: 5 - [c33]Niklas Borselius, Chris J. Mitchell:
Securing FIPA Agent Communication. Security and Management 2003: 135-141 - [c32]Mansour A. Al-Meaither, Chris J. Mitchell
:
A Secure Electronic Payment Scheme for Charity Donations. EC-Web 2003: 50-61 - [c31]Vorapranee Khu-smith, Chris J. Mitchell
:
Enhancing E-commerce Security Using GSM Authentication. EC-Web 2003: 72-83 - [c30]Chris J. Mitchell
:
Remote User Authentication Using Public Information. IMACC 2003: 360-369 - [c29]Andreas Pashalidis, Chris J. Mitchell
:
Single Sign-On Using Trusted Platforms. ISC 2003: 54-68 - [c28]Paulo S. Pagliusi, Chris J. Mitchell
:
PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. WISA 2003: 135-149 - 2002
- [j43]Niklas Borselius, Chris J. Mitchell
, Aaron Wilson:
A pragmatic alternative to undetachable signatures. ACM SIGOPS Oper. Syst. Rev. 36(2): 6-11 (2002) - [j42]Niklas Borselius, Chris J. Mitchell
, Aaron Wilson:
On the value of threshold signatures. ACM SIGOPS Oper. Syst. Rev. 36(4): 30-35 (2002) - [j41]Günther Horn, Keith M. Martin, Chris J. Mitchell
:
Authentication protocols for mobile network environment value-added services. IEEE Trans. Veh. Technol. 51(2): 383-392 (2002) - [c27]Luciano Rila, Chris J. Mitchell:
Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication. CARDIS 2002 - [c26]Chris J. Mitchell
, Namhyun Hur:
On the security of a structural proven signer ordering multisignature scheme. Communications and Multimedia Security 2002: 1-8 - [c25]Sattam S. Al-Riyami, Chris J. Mitchell
:
Renewing crytographic timestamps. Communications and Multimedia Security 2002: 9-16 - [c24]Vorapranee Khu-smith, Chris J. Mitchell
:
Using EMV Cards to Protect E-commerce Transactions. EC-Web 2002: 388-399 - [c23]Pita Jarupunphol, Chris J. Mitchell:
Implementation Aspects of SET/EMV. I3E 2002: 305-315 - [c22]Chris J. Mitchell
, Paulo S. Pagliusi:
Is Entity Authentication Necessary? Security Protocols Workshop 2002: 20-33 - [c21]Pita Jarupunphol, Chris J. Mitchell:
E-commerce and the Media - Influences on Security Risk Perceptions. WITASI 2002: 163-174 - [c20]Vorapranee Khu-smith, Chris J. Mitchell
:
Using GSM to enhance e-commerce security. Workshop Mobile Commerce 2002: 75-81 - 2001
- [j40]Lars R. Knudsen, Chris J. Mitchell
:
An analysis of the 3gpp-MAC scheme. Electron. Notes Discret. Math. 6: 346-355 (2001) - [c19]Karl Brincat, Chris J. Mitchell
:
New CBC-MAC Forgery Attacks. ACISP 2001: 3-14 - [c18]Vorapranee Khu-smith, Chris J. Mitchell
:
Enhancing the Security of Cookies. ICISC 2001: 132-145 - [c17]Karl Brincat, Chris J. Mitchell
:
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. IMACC 2001: 63-72 - [c16]Niklas Borselius, Chris J. Mitchell
, Aaron Wilson:
Undetachable Threshold Signatures. IMACC 2001: 239-244 - [c15]Konstantinos Rantos
, Chris J. Mitchell
:
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. IMACC 2001: 268-276 - [c14]Niklas Borselius, Chris J. Mitchell
, Aaron Wilson:
On Mobile Agent Based Transactions in Moderately Hostile Environments. Network Security 2001: 173-186 - 2000
- [j39]Chris J. Mitchell
:
PKI standards. Inf. Secur. Tech. Rep. 5(4): 17-32 (2000) - [j38]Chris J. Mitchell
:
Making serial number based authentication robust against loss of state. ACM SIGOPS Oper. Syst. Rev. 34(3): 56-59 (2000) - [c13]Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell
:
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. CRYPTO 2000: 184-196
1990 – 1999
- 1999
- [j37]Chris J. Mitchell
, Konstantinos Rantos
:
A fair certification protocol. Comput. Commun. Rev. 29(3): 47-49 (1999) - [j36]Keith M. Martin, Chris J. Mitchell
:
Comments on an optimized protocol for mobile network authentication and security. ACM SIGMOBILE Mob. Comput. Commun. Rev. 3(2): 37 (1999) - 1998
- [j35]Chris J. Mitchell
, Kenneth G. Paterson:
Perfect Factors from Cyclic Codes and Interleaving. SIAM J. Discret. Math. 11(2): 241-264 (1998) - [j34]Chris J. Mitchell
, Chan Yeob Yeun:
Fixing a Problem in the Helsinki Protocol. ACM SIGOPS Oper. Syst. Rev. 32(4): 21-24 (1998) - [j33]Chris J. Mitchell
:
On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes. IEEE Trans. Inf. Theory 44(7): 3146-3150 (1998) - [c12]Peter Y. A. Ryan
, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166 - [c11]Keith M. Martin, Bart Preneel, Chris J. Mitchell, Hans-Joachim Hitz, Günther Horn, Alla Poliakova, Peter Howard:
Secure Billing for Mobile Information Services in UMTS. IS&N 1998: 535-548 - 1997
- [j32]Yongfei Han, Chris J. Mitchell
, Dieter Gollmann:
A fast modular exponentiation for rsa on systolic arrays. Int. J. Comput. Math. 63(3-4): 215-226 (1997) - [j31]Chris J. Mitchell
:
Authentication using cryptography. Inf. Secur. Tech. Rep. 2(2): 25-32 (1997) - [j30]Chris J. Mitchell
:
De Bruijn Sequences and Perfect Factors. SIAM J. Discret. Math. 10(2): 270-281 (1997) - [j29]Liqun Chen
, Dieter Gollmann, Chris J. Mitchell
:
Authentication Using Minimally Trusted Servers. ACM SIGOPS Oper. Syst. Rev. 31(3): 16-28 (1997) - [c10]Mark P. Hoyle, Chris J. Mitchell
:
On Solutions to the Key Escrow Problem. State of the Art in Applied Cryptography 1997: 277-306 - [c9]Liqun Chen
, Dieter Gollmann, Chris J. Mitchell
, Peter R. Wild:
Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193 - [c8]Liqun Chen, Chris J. Mitchell
:
An anonymous and undeniable payment scheme. ICICS 1997: 478-482 - 1996
- [j28]Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild:
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. Des. Codes Cryptogr. 7(1-2): 101-110 (1996) - [j27]Dieter Gollmann, Yongfei Han, Chris J. Mitchell:
Redundant Integer Representations and Fast Exponentiation. Des. Codes Cryptogr. 7(1-2): 135-151 (1996) - [j26]Chris J. Mitchell
:
The royal holloway TTP-based key escrow scheme. Inf. Secur. Tech. Rep. 1(1): 63-69 (1996) - [j25]Glenn Hurlbert, Chris J. Mitchell
, Kenneth G. Paterson:
On the Existence of de Bruijn Tori with Two by Two Windows. J. Comb. Theory A 76(2): 213-230 (1996) - [j24]Chris J. Mitchell
, Liqun Chen
:
Comments on the S/KEY User Authentication Scheme. ACM SIGOPS Oper. Syst. Rev. 30(4): 12-16 (1996) - [j23]Chris J. Mitchell
, Tuvi Etzion, Kenneth G. Paterson:
A method for constructing decodable de Bruijn sequences. IEEE Trans. Inf. Theory 42(5): 1472-1478 (1996) - [c7]Liqun Chen
, Dieter Gollmann, Chris J. Mitchell
:
Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133 - [c6]Liqun Chen
, Dieter Gollmann, Chris J. Mitchell:
Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153 - 1995
- [j22]Liqun Chen
, Dieter Gollmann, Chris J. Mitchell:
Distributing Trust Amongst Multiple Authentication Servers. J. Comput. Secur. 3(4): 255-268 (1995) - [j21]Chris J. Mitchell
:
Aperiodic and semi-periodic perfect maps. IEEE Trans. Inf. Theory 41(1): 88-95 (1995) - [c5]Nigel Jefferies, Chris J. Mitchell
, Michael Walker:
A Proposed Architecture for Trusted Third Party Services. Cryptography: Policy and Algorithms 1995: 98-104 - [c4]Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Key distribution without individual trusted authentification servers. CSFW 1995: 30- - [c3]Yongfei Han, Dieter Gollmann, Chris J. Mitchell
:
Minimal Weight k-SR Representations. IMACC 1995: 34-43 - [c2]Chris J. Mitchell
:
A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels. IMACC 1995: 84-93 - 1994
- [j20]Chris J. Mitchell
, Kenneth G. Paterson:
Decoding Perfect Maps. Des. Codes Cryptogr. 4(1): 11-30 (1994) - [j19]Chris J. Mitchell
:
Constructing c-ary Perfect Factors. Des. Codes Cryptogr. 4(4): 341-368 (1994) - [j18]Jonathan Jedwab, Chris J. Mitchell
, Fred Piper, Peter R. Wild:
Perfect binary arrays and difference sets. Discret. Math. 125(1-3): 241-254 (1994) - [j17]Chris J. Mitchell
, Michael Walker, Peter R. Wild:
The Combinatorics of Perfect Authentication Schemes. SIAM J. Discret. Math. 7(1): 102-107 (1994) - [j16]John Burns, Chris J. Mitchell
:
Parameter Selection for Server-Aided RSA Computation Schemes. IEEE Trans. Computers 43(2): 163-174 (1994) - 1993
- [j15]Chris J. Mitchell, Andy Thomas:
Standardising Authentication Protocols Based on Public-Key Techniques. J. Comput. Secur. 2: 23-36 (1993) - 1992
- [j14]Chris J. Mitchell:
Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure. IEEE Trans. Computers 41(4): 505-507 (1992) - 1991
- [j13]Chris J. Mitchell
, Vijay Varadharajan:
Modified forms of cipher block chaining. Comput. Secur. 10(1): 37-40 (1991) - 1990
- [j12]Colin I'Anson, Chris J. Mitchell
:
Security defects in CCITT recommendation X.509: the directory authentication framework. Comput. Commun. Rev. 20(2): 30-34 (1990) - [j11]Chris J. Mitchell, Dave Rush, Michael Walker:
A Secure Messaging Architecture Implementing the X.400-1988 Security Features. Comput. J. 33(4): 290-295 (1990) - [j10]John Burns, Chris J. Mitchell
:
A security scheme for resource sharing over a network. Comput. Secur. 9(1): 67-75 (1990) - [j9]Chris J. Mitchell
:
Enumerating Boolean Functions of Cryptographic Significance. J. Cryptol. 2(3): 155-170 (1990) - [j8]Philippe Godlewski, Chris J. Mitchell
:
Key-Minimal Crytosystems for Unconditional Secrecy. J. Cryptol. 3(1): 1-25 (1990)
1980 – 1989
- 1989
- [j7]Chris J. Mitchell:
Multi-Destination Secure Electronic Mail. Comput. J. 32(1): 13-15 (1989) - [j6]Chris J. Mitchell:
Another Postage Stamp Problem. Comput. J. 32(4): 374-376 (1989) - [j5]Chris J. Mitchell
, Dave Rush, Michael Walker:
A remark on hash functions for message authentication. Comput. Secur. 8(1): 55-58 (1989) - [j4]Chris J. Mitchell, Peter R. Wild:
One-stage one-sided rearrangeable switching networks. IEEE Trans. Commun. 37(1): 52-56 (1989) - [c1]Philippe Godlewski, Chris J. Mitchell
:
Key Minimal Authentication Systems for Unconditional Secrecy. EUROCRYPT 1989: 497-501 - 1988
- [j3]Chris J. Mitchell
, Michael Walker:
Solutions to the multidestination secure electronic mail problem. Comput. Secur. 7(5): 483-488 (1988) - [j2]Chris J. Mitchell
, Fred Piper:
Key storage in secure networks. Discret. Appl. Math. 21(3): 215-228 (1988) - 1987
- [j1]Chris J. Mitchell
, Fred Piper:
The cost of reducing key-storage requirements in secure networks. Comput. Secur. 6(4): 339-341 (1987)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-22 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint