default search action
Chris J. Mitchell
Person information
- affiliation: Royal Holloway, University of London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [i32]Chris J. Mitchell:
Integrity-protecting block cipher modes - Untangling a tangled web. CoRR abs/2403.03654 (2024) - 2023
- [j74]Tomer Ashur, Chris J. Mitchell:
Special Issue on Failed Approaches and Insightful Losses in Cryptology - Foreword. Comput. J. 66(6): 1311 (2023) - 2022
- [j73]Chris J. Mitchell, Peter R. Wild:
Constructing Orientable Sequences. IEEE Trans. Inf. Theory 68(7): 4782-4789 (2022) - 2021
- [j72]Maryam Mehrnezhad, Thyla van der Merwe, Chris J. Mitchell:
Guest Editorial: Security and Privacy. IEEE Commun. Stand. Mag. 5(3): 10-11 (2021) - [j71]Chris J. Mitchell:
How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes. IET Inf. Secur. 15(3): 223-230 (2021) - [j70]Chris J. Mitchell:
Yet another insecure group key distribution scheme using secret sharing. J. Inf. Secur. Appl. 57: 102713 (2021) - [c103]Marc Sel, Chris J. Mitchell:
Automating the Evaluation of Trustworthiness. TrustBus 2021: 18-31 - [c102]Gaëtan Pradel, Chris J. Mitchell:
Privacy-Preserving Biometric Matching Using Homomorphic Encryption. TrustCom 2021: 494-505 - [e14]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8661-6 [contents] - [i31]Chris J. Mitchell:
The (in)security of some recently proposed lightweight key distribution schemes. CoRR abs/2101.08132 (2021) - [i30]Gaëtan Pradel, Chris J. Mitchell:
Privacy-Preserving Biometric Matching Using Homomorphic Encryption. CoRR abs/2111.12372 (2021) - 2020
- [j69]Chris J. Mitchell:
The impact of quantum computing on real-world security: A 5G case study. Comput. Secur. 93: 101825 (2020) - [c101]Gaëtan Pradel, Chris J. Mitchell:
Post-quantum Certificates for Electronic Travel Documents. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 56-73 - [c100]Wanpeng Li, Chris J. Mitchell:
User Access Privacy in OAuth 2.0 and OpenID Connect. EuroS&P Workshops 2020: 664-672 - [e13]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, Virtual Event, USA, November, 2020. ACM 2020, ISBN 978-1-4503-8091-1 [contents] - [e12]Thyla van der Merwe, Chris J. Mitchell, Maryam Mehrnezhad:
Security Standardisation Research - 6th International Conference, SSR 2020, London, UK, November 30 - December 1, 2020, Proceedings. Lecture Notes in Computer Science 12529, Springer 2020, ISBN 978-3-030-64356-0 [contents] - [i29]Chris J. Mitchell:
Yet another insecure group key distribution scheme using secret sharing. CoRR abs/2003.14356 (2020) - [i28]Chris J. Mitchell:
How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes. CoRR abs/2004.05597 (2020) - [i27]Chris J. Mitchell:
Who Needs Trust for 5G? CoRR abs/2005.00862 (2020) - [i26]Chris J. Mitchell:
How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure. CoRR abs/2005.04434 (2020) - [i25]Chris J. Mitchell:
Provably insecure group authentication: Not all security proofs are what they claim to be. CoRR abs/2005.05376 (2020) - [i24]Chris J. Mitchell:
An insecure noninteractive group key establishment scheme. CoRR abs/2009.09278 (2020)
2010 – 2019
- 2019
- [j68]Chris J. Mitchell:
Security issues in a group key establishment protocol. Comput. J. 62(3): 373-376 (2019) - [c99]Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect. SSR 2019: 35-44 - [e11]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6840-7 [contents] - [i23]Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect. CoRR abs/1901.08960 (2019) - [i22]Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J. Mitchell:
Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking. CoRR abs/1905.09581 (2019) - [i21]Chris J. Mitchell:
The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure. CoRR abs/1906.09330 (2019) - [i20]Chris J. Mitchell:
The impact of quantum computing on real-world security: A 5G case study. CoRR abs/1911.07583 (2019) - 2018
- [j67]Liqun Chen, Jinguang Han, Chris J. Mitchell:
Message from the Guest Editors. Int. J. Inf. Sec. 17(5): 491-492 (2018) - [c98]Fatma Al Maqbali, Chris J. Mitchell:
Email-based Password Recovery - Risking or Rescuing Users? ICCST 2018: 1-5 - [c97]Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J. Mitchell:
Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking. ISC 2018: 481-501 - [c96]Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
Mitigating CSRF attacks on OAuth 2.0 Systems. PST 2018: 1-5 - [c95]Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations. Security Protocols Workshop 2018: 24-41 - [i19]Fatma Al Maqbali, Chris J. Mitchell:
Web password recovery - a necessary evil? CoRR abs/1801.06730 (2018) - [i18]Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect. CoRR abs/1801.07983 (2018) - [i17]Chris J. Mitchell:
Security issues in a group key establishment protocol. CoRR abs/1803.01137 (2018) - [i16]Chris J. Mitchell:
The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure. CoRR abs/1803.05365 (2018) - 2017
- [c94]Fatma Al Maqbali, Chris J. Mitchell:
AutoPass: An automatic password generator. ICCST 2017: 1-6 - [c93]Mohammed Shafiul Alam Khan, Chris J. Mitchell:
Trashing IMSI catchers in mobile networks. WISEC 2017: 207-218 - [e10]Giovanni Livraga, Chris J. Mitchell:
Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings. Lecture Notes in Computer Science 10547, Springer 2017, ISBN 978-3-319-68062-0 [contents] - [i15]Fatma Al Maqbali, Chris J. Mitchell:
AutoPass: An Automatic Password Generator. CoRR abs/1703.01959 (2017) - 2016
- [j66]Dieter Jungnickel, Jennifer D. Key, Chris J. Mitchell, Ronald C. Mullin, Peter R. Wild:
Editorial for the 25th anniversary issue. Des. Codes Cryptogr. 78(1): 1-3 (2016) - [j65]Liqun Chen, Chris J. Mitchell:
Message from the guest editors. Int. J. Inf. Sec. 15(6): 573-574 (2016) - [j64]Chris J. Mitchell:
On the Security of 2-Key Triple DES. IEEE Trans. Inf. Theory 62(11): 6260-6267 (2016) - [c92]Wanpeng Li, Chris J. Mitchell:
Analysing the Security of Google's Implementation of OpenID Connect. DIMVA 2016: 357-376 - [c91]Mohammed Shafiul Alam Khan, Chris J. Mitchell:
Retrofitting Mutual Authentication to GSM Using RAND Hijacking. STM 2016: 17-31 - [c90]Fatma Al Maqbali, Chris J. Mitchell:
Password Generators: Old Ideas and New. WISTP 2016: 245-253 - [e9]Lidong Chen, David A. McGrew, Chris J. Mitchell:
Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Lecture Notes in Computer Science 10074, Springer 2016, ISBN 978-3-319-49099-1 [contents] - [i14]Chris J. Mitchell:
On the security of 2-key triple DES. CoRR abs/1602.06229 (2016) - [i13]Mohammed Shafiul Alam Khan, Chris J. Mitchell:
Retrofitting mutual authentication to GSM using RAND hijacking. CoRR abs/1607.00729 (2016) - [i12]Fatma Al Maqbali, Chris J. Mitchell:
Password Generators: Old Ideas and New. CoRR abs/1607.04421 (2016) - 2015
- [c89]Wanpeng Li, Chris J. Mitchell:
Addressing Threats to Real-World Identity Management Systems. ISSE 2015: 251-259 - [c88]Mohammed Shafiul Alam Khan, Chris J. Mitchell:
Improving Air Interface User Privacy in Mobile Telephony. SSR 2015: 165-184 - [c87]Mwawi Nyirenda Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li, Chris J. Mitchell, Po-Wah Yau:
Generating Unlinkable IPv6 Addresses. SSR 2015: 185-199 - [e8]Javier López, Chris J. Mitchell:
Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings. Lecture Notes in Computer Science 9290, Springer 2015, ISBN 978-3-319-23317-8 [contents] - [i11]Mohammed Shafiul Alam Khan, Chris J. Mitchell:
Improving Air Interface User Privacy in Mobile Telephony. CoRR abs/1504.03287 (2015) - [i10]Wanpeng Li, Chris J. Mitchell:
Analysing the Security of Google's implementation of OpenID Connect. CoRR abs/1508.01707 (2015) - 2014
- [c86]Mohammed Shafiul Alam Khan, Chris J. Mitchell:
Another Look at Privacy Threats in 3G Mobile Telephony. ACISP 2014: 386-396 - [c85]Wanpeng Li, Chris J. Mitchell:
Security Issues in OAuth 2.0 SSO Implementations. ISC 2014: 529-541 - [e7]Liqun Chen, Chris J. Mitchell:
Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings. Lecture Notes in Computer Science 8893, Springer 2014, ISBN 978-3-319-14053-7 [contents] - 2013
- [j63]Chunhua Chen, Chris J. Mitchell, Shaohua Tang:
Ubiquitous One-Time Password Service Using the Generic Authentication Architecture. Mob. Networks Appl. 18(5): 738-747 (2013) - [j62]Haitham S. Al-Sinani, Chris J. Mitchell:
Enabling interoperation between Shibboleth and Information Card systems. Secur. Commun. Networks 6(2): 219-229 (2013) - [c84]Chris J. Mitchell:
Analysing the IOBC Authenticated Encryption Mode. ACISP 2013: 1-12 - [e6]Sabrina De Capitani di Vimercati, Chris J. Mitchell:
Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7868, Springer 2013, ISBN 978-3-642-40011-7 [contents] - [e5]Simone Fischer-Hübner, Elisabeth de Leeuw, Chris J. Mitchell:
Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. IFIP Advances in Information and Communication Technology 396, Springer 2013, ISBN 978-3-642-37281-0 [contents] - 2012
- [j61]Gina Kounga, Chris J. Mitchell, Thomas Walter:
Generating certification authority authenticated public keys in ad hoc networks. Secur. Commun. Networks 5(1): 87-106 (2012) - [c83]Chunhua Chen, Shaohua Tang, Chris J. Mitchell:
Building General-Purpose Security Services on EMV Payment Cards. SecureComm 2012: 29-44 - [e4]Chris J. Mitchell, Allan Tomlinson:
Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings. Lecture Notes in Computer Science 7711, Springer 2012, ISBN 978-3-642-35370-3 [contents] - 2011
- [j60]Boyeon Song, Chris J. Mitchell:
Scalable RFID security protocols supporting tag ownership transfer. Comput. Commun. 34(4): 556-566 (2011) - [c82]Haitham S. Al-Sinani, Chris J. Mitchell:
Enhancing CardSpace Authentication Using a Mobile Device. DBSec 2011: 201-216 - [c81]Haitham S. Al-Sinani, Chris J. Mitchell:
A Universal Client-Based Identity Management Tool. EuroPKI 2011: 49-74 - [c80]Chunhua Chen, Chris J. Mitchell, Shaohua Tang:
Building General Purpose Security Services on Trusted Computing. INTRUST 2011: 16-31 - [c79]Haitham S. Al-Sinani, Chris J. Mitchell:
Client-Based CardSpace-OpenID Interoperation. ISCIS 2011: 387-393 - [c78]Haitham S. Al-Sinani, Chris J. Mitchell:
Extending the Scope of cardspace. SIN 2011: 235-238 - [c77]Chunhua Chen, Chris J. Mitchell, Shaohua Tang:
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key. WISTP 2011: 54-68 - 2010
- [j59]Liqun Chen, Chris J. Mitchell:
Parsing ambiguities in authentication and key establishment protocols. Int. J. Electron. Secur. Digit. Forensics 3(1): 82-94 (2010) - [c76]Waleed A. Alrodhan, Chris J. Mitchell:
Enhancing user authentication in claim-based identity management. CTS 2010: 75-83 - [c75]Haitham S. Al-Sinani, Chris J. Mitchell:
Using CardSpace as a Password Manager. IDMAN 2010: 18-30 - [c74]Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J. Mitchell:
CardSpace-liberty integration for CardSpace users. IDtrust 2010: 12-25
2000 – 2009
- 2009
- [j58]Eimear Gallery, Chris J. Mitchell:
Trusted Computing: Security and Applications. Cryptologia 33(3): 217-245 (2009) - [j57]Waleed A. Alrodhan, Chris J. Mitchell:
Improving the Security of CardSpace. EURASIP J. Inf. Secur. 2009 (2009) - [c73]Boyeon Song, Chris J. Mitchell:
Scalable RFID Pseudonym Protocol. NSS 2009: 216-224 - [c72]Chris J. Mitchell:
A Novel Stateless Authentication Protocol. Security Protocols Workshop 2009: 269-274 - [c71]Chris J. Mitchell:
A Novel Stateless Authentication Protocol. Security Protocols Workshop 2009: 275-281 - [e3]Sihan Qing, Chris J. Mitchell, Guilin Wang:
Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings. Lecture Notes in Computer Science 5927, Springer 2009, ISBN 978-3-642-11144-0 [contents] - [e2]Liqun Chen, Chris J. Mitchell, Andrew P. Martin:
Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings. Lecture Notes in Computer Science 5471, Springer 2009, ISBN 978-3-642-00586-2 [contents] - [e1]Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater:
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings. Lecture Notes in Computer Science 5746, Springer 2009, ISBN 978-3-642-03943-0 [contents] - 2008
- [j56]Shane Balfe, Eimear Gallery, Chris J. Mitchell, Kenneth G. Paterson:
Challenges for Trusted Computing. IEEE Secur. Priv. 6(6): 60-66 (2008) - [c70]Georgios Kalogridis, Chris J. Mitchell:
Using Non-adaptive Group Testing to Construct Spy Agent Routes. ARES 2008: 1013-1019 - [c69]Adrian Leung, Chris J. Mitchell:
A Device Management Framework for Secure Ubiquitous Service Delivery. IAS 2008: 267-274 - [c68]Waleed A. Alrodhan, Chris J. Mitchell:
A client-side CardSpace-Liberty integration architecture. IDtrust 2008: 1-7 - [c67]Adrian Leung, Liqun Chen, Chris J. Mitchell:
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). TRUST 2008: 179-190 - [c66]Boyeon Song, Chris J. Mitchell:
RFID authentication protocol for low-cost tags. WISEC 2008: 140-147 - [i9]Liqun Chen, Chris J. Mitchell:
Parsing ambiguities in authentication and key establishment protocols. IACR Cryptol. ePrint Arch. 2008: 419 (2008) - 2007
- [j55]Chris J. Mitchell, Fred Piper, Peter R. Wild:
ID-based cryptography using symmetric primitives. Des. Codes Cryptogr. 44(1-3): 249-262 (2007) - [c65]Imad M. Abbadi, Chris J. Mitchell:
Digital rights management using a mobile phone. ICEC 2007: 185-194 - [c64]Suranjith Ariyapperuma, Chris J. Mitchell:
Security vulnerabilities in DNS and DNSSEC. ARES 2007: 335-342 - [c63]Waleed A. Alrodhan, Chris J. Mitchell:
Addressing privacy issues in CardSpace. IAS 2007: 285-291 - [c62]Eimear Gallery, Chris J. Mitchell:
Trusted Mobile Platforms. FOSAD 2007: 282-323 - [c61]Adrian Leung, Chris J. Mitchell:
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. UbiComp 2007: 73-90 - [c60]Chris J. Mitchell:
Cryptanalysis of the EPBC Authenticated Encryption Mode. IMACC 2007: 118-128 - 2006
- [j54]Chris J. Mitchell:
Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen). it Inf. Technol. 48(6): 321- (2006) - [j53]Qiang Tang, Chris J. Mitchell:
Cryptanalysis of a hybrid authentication protocol for large mobile networks. J. Syst. Softw. 79(4): 496-501 (2006) - [c59]Adrian Leung, Chris J. Mitchell:
A Service Discovery Threat Model for Ad Hoc Networks. SECRYPT 2006: 167-174 - [c58]Sharon Nachtigal, Chris J. Mitchell:
Modelling E-Business Security Using Business Processes. SECRYPT 2006: 459-464 - [c57]Chris J. Mitchell:
Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. Security Protocols Workshop 2006: 164-170 - [c56]Chris J. Mitchell:
Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. Security Protocols Workshop 2006: 171-176 - 2005
- [j52]Konstantinos Rantos, Chris J. Mitchell:
Matching key recovery mechanisms to business requirements. Comput. Secur. 24(3): 232-245 (2005) - [j51]Qiang Tang, Chris J. Mitchell:
Comments on a cryptographic key assignment scheme. Comput. Stand. Interfaces 27(3): 323-326 (2005) - [j50]Qiang Tang, Chris J. Mitchell:
Comments on two anonymous conference key distribution systems. Comput. Stand. Interfaces 27(4): 397-400 (2005) - [j49]Anand S. Gajparia, Chris J. Mitchell, Chan Yeob Yeun:
Supporting User Privacy in Location Based Services. IEICE Trans. Commun. 88-B(7): 2837-2847 (2005) - [j48]Adil Alsaid, Chris J. Mitchell:
Dynamic content attacks on digital signatures. Inf. Manag. Comput. Security 13(4): 328-336 (2005) - [j47]Lars R. Knudsen, Chris J. Mitchell:
Partial Key Recovery Attack Against RMAC. J. Cryptol. 18(4): 375-389 (2005) - [c55]Chris J. Mitchell:
Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. ACISP 2005: 560-571 - [c54]Qiang Tang, Chris J. Mitchell:
On the Security of Some Password-Based Key Agreement Schemes. CIS (2) 2005: 149-154 - [c53]Qiang Tang, Chris J. Mitchell:
Efficient Compilers for Authenticated Group Key Exchange. CIS (2) 2005: 192-197 - [c52]Georgios Kalogridis, Chris J. Mitchell, Gary Clemo:
Spy Agents: Evaluating Trust in Remote Environments. Security and Management 2005: 405-411 - [c51]Geraint Price, Chris J. Mitchell:
Interoperation Between a Conventional PKI and an ID-Based Infrastructure. EuroPKI 2005: 73-85 - [c50]Adil Alsaid, Chris J. Mitchell:
Installing Fake Root Keys in a PC. EuroPKI 2005: 227-239 - [c49]Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas T. Courtois, Blandine Debraize, Chris J. Mitchell:
Analysis of the Bit-Search Generator and Sequence Compression Techniques. FSE 2005: 196-214 - [c48]Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell:
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. FSE 2005: 299-319 - [c47]Qiang Tang, Chris J. Mitchell:
Security Properties of Two Authenticated Conference Key Agreement Protocols. ICICS 2005: 304-314 - [c46]Chris J. Mitchell:
Partial Key Recovery Attacks on XCBC, TMAC and OMAC. IMACC 2005: 155-167 - [c45]Chris J. Mitchell:
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? ISC 2005: 244-258 - [c44]Shenglan Hu, Chris J. Mitchell:
Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling. MSN 2005: 83-92 - [c43]