default search action
BibTeX records: Chris J. Mitchell
@article{DBLP:journals/corr/abs-2403-03654, author = {Chris J. Mitchell}, title = {Integrity-protecting block cipher modes - Untangling a tangled web}, journal = {CoRR}, volume = {abs/2403.03654}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.03654}, doi = {10.48550/ARXIV.2403.03654}, eprinttype = {arXiv}, eprint = {2403.03654}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-03654.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AshurM23, author = {Tomer Ashur and Chris J. Mitchell}, title = {Special Issue on Failed Approaches and Insightful Losses in Cryptology - Foreword}, journal = {Comput. J.}, volume = {66}, number = {6}, pages = {1311}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxac191}, doi = {10.1093/COMJNL/BXAC191}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AshurM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MitchellW22, author = {Chris J. Mitchell and Peter R. Wild}, title = {Constructing Orientable Sequences}, journal = {{IEEE} Trans. Inf. Theory}, volume = {68}, number = {7}, pages = {4782--4789}, year = {2022}, url = {https://doi.org/10.1109/TIT.2022.3158645}, doi = {10.1109/TIT.2022.3158645}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/MitchellW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csm/MehrnezhadMM21, author = {Maryam Mehrnezhad and Thyla van der Merwe and Chris J. Mitchell}, title = {Guest Editorial: Security and Privacy}, journal = {{IEEE} Commun. Stand. Mag.}, volume = {5}, number = {3}, pages = {10--11}, year = {2021}, url = {https://doi.org/10.1109/MCOMSTD.2021.9579395}, doi = {10.1109/MCOMSTD.2021.9579395}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csm/MehrnezhadMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Mitchell21, author = {Chris J. Mitchell}, title = {How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes}, journal = {{IET} Inf. Secur.}, volume = {15}, number = {3}, pages = {223--230}, year = {2021}, url = {https://doi.org/10.1049/ise2.12016}, doi = {10.1049/ISE2.12016}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Mitchell21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Mitchell21, author = {Chris J. Mitchell}, title = {Yet another insecure group key distribution scheme using secret sharing}, journal = {J. Inf. Secur. Appl.}, volume = {57}, pages = {102713}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102713}, doi = {10.1016/J.JISA.2020.102713}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Mitchell21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/SelM21, author = {Marc Sel and Chris J. Mitchell}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {Automating the Evaluation of Trustworthiness}, booktitle = {Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, Virtual Event, September 27-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12927}, pages = {18--31}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86586-3\_2}, doi = {10.1007/978-3-030-86586-3\_2}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/SelM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PradelM21, author = {Ga{\"{e}}tan Pradel and Chris J. Mitchell}, title = {Privacy-Preserving Biometric Matching Using Homomorphic Encryption}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {494--505}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00079}, doi = {10.1109/TRUSTCOM53373.2021.00079}, timestamp = {Sun, 13 Mar 2022 10:52:35 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PradelM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2021cysarm, editor = {Liqun Chen and Chris J. Mitchell and Thanassis Giannetsos and Daniele Sgandurra}, title = {CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, Virtual Event, Republic of Korea, 19 November 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474374}, doi = {10.1145/3474374}, isbn = {978-1-4503-8661-6}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2021cysarm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-08132, author = {Chris J. Mitchell}, title = {The (in)security of some recently proposed lightweight key distribution schemes}, journal = {CoRR}, volume = {abs/2101.08132}, year = {2021}, url = {https://arxiv.org/abs/2101.08132}, eprinttype = {arXiv}, eprint = {2101.08132}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-08132.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-12372, author = {Ga{\"{e}}tan Pradel and Chris J. Mitchell}, title = {Privacy-Preserving Biometric Matching Using Homomorphic Encryption}, journal = {CoRR}, volume = {abs/2111.12372}, year = {2021}, url = {https://arxiv.org/abs/2111.12372}, eprinttype = {arXiv}, eprint = {2111.12372}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-12372.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Mitchell20, author = {Chris J. Mitchell}, title = {The impact of quantum computing on real-world security: {A} 5G case study}, journal = {Comput. Secur.}, volume = {93}, pages = {101825}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101825}, doi = {10.1016/J.COSE.2020.101825}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Mitchell20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PradelM20, author = {Ga{\"{e}}tan Pradel and Chris J. Mitchell}, editor = {Ioana Boureanu and Constantin Catalin Dragan and Mark Manulis and Thanassis Giannetsos and Christoforos Dadoyan and Panagiotis Gouvas and Roger A. Hallman and Shujun Li and Victor Chang and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse}, title = {Post-quantum Certificates for Electronic Travel Documents}, booktitle = {Computer Security - {ESORICS} 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12580}, pages = {56--73}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66504-3\_4}, doi = {10.1007/978-3-030-66504-3\_4}, timestamp = {Sun, 10 Dec 2023 06:07:27 +0100}, biburl = {https://dblp.org/rec/conf/esorics/PradelM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/LiM20, author = {Wanpeng Li and Chris J. Mitchell}, title = {User Access Privacy in OAuth 2.0 and OpenID Connect}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {664--672}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00095}, doi = {10.1109/EUROSPW51379.2020.00095}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/LiM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020cysarm, editor = {Liqun Chen and Chris J. Mitchell and Thanassis Giannetsos and Daniele Sgandurra}, title = {CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, Virtual Event, USA, November, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411505}, doi = {10.1145/3411505}, isbn = {978-1-4503-8091-1}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2020cysarm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secsr/2020, editor = {Thyla van der Merwe and Chris J. Mitchell and Maryam Mehrnezhad}, title = {Security Standardisation Research - 6th International Conference, {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12529}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64357-7}, doi = {10.1007/978-3-030-64357-7}, isbn = {978-3-030-64356-0}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secsr/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-14356, author = {Chris J. Mitchell}, title = {Yet another insecure group key distribution scheme using secret sharing}, journal = {CoRR}, volume = {abs/2003.14356}, year = {2020}, url = {https://arxiv.org/abs/2003.14356}, eprinttype = {arXiv}, eprint = {2003.14356}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-14356.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-05597, author = {Chris J. Mitchell}, title = {How not to secure wireless sensor networks: {A} plethora of insecure polynomial-based key pre-distribution schemes}, journal = {CoRR}, volume = {abs/2004.05597}, year = {2020}, url = {https://arxiv.org/abs/2004.05597}, eprinttype = {arXiv}, eprint = {2004.05597}, timestamp = {Tue, 28 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-05597.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-00862, author = {Chris J. Mitchell}, title = {Who Needs Trust for 5G?}, journal = {CoRR}, volume = {abs/2005.00862}, year = {2020}, url = {https://arxiv.org/abs/2005.00862}, eprinttype = {arXiv}, eprint = {2005.00862}, timestamp = {Fri, 08 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-00862.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-04434, author = {Chris J. Mitchell}, title = {How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure}, journal = {CoRR}, volume = {abs/2005.04434}, year = {2020}, url = {https://arxiv.org/abs/2005.04434}, eprinttype = {arXiv}, eprint = {2005.04434}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-04434.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-05376, author = {Chris J. Mitchell}, title = {Provably insecure group authentication: Not all security proofs are what they claim to be}, journal = {CoRR}, volume = {abs/2005.05376}, year = {2020}, url = {https://arxiv.org/abs/2005.05376}, eprinttype = {arXiv}, eprint = {2005.05376}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-05376.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-09278, author = {Chris J. Mitchell}, title = {An insecure noninteractive group key establishment scheme}, journal = {CoRR}, volume = {abs/2009.09278}, year = {2020}, url = {https://arxiv.org/abs/2009.09278}, eprinttype = {arXiv}, eprint = {2009.09278}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-09278.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Mitchell19, author = {Chris J. Mitchell}, title = {Security issues in a group key establishment protocol}, journal = {Comput. J.}, volume = {62}, number = {3}, pages = {373--376}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxy058}, doi = {10.1093/COMJNL/BXY058}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Mitchell19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/LiMC19, author = {Wanpeng Li and Chris J. Mitchell and Thomas M. Chen}, editor = {Maryam Mehrnezhad and Thyla van der Merwe and Feng Hao}, title = {OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security Standardisation Research Workshop, London, UK, November 11, 2019}, pages = {35--44}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338500.3360331}, doi = {10.1145/3338500.3360331}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/LiMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2019cysarm, editor = {Liqun Chen and Chris J. Mitchell and Thanassis Giannetsos and Daniele Sgandurra}, title = {Proceedings of the 1st {ACM} Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338511}, doi = {10.1145/3338511}, isbn = {978-1-4503-6840-7}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2019cysarm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-08960, author = {Wanpeng Li and Chris J. Mitchell and Thomas M. Chen}, title = {OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect}, journal = {CoRR}, volume = {abs/1901.08960}, year = {2019}, url = {http://arxiv.org/abs/1901.08960}, eprinttype = {arXiv}, eprint = {1901.08960}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-08960.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-09581, author = {Nasser Mohammed Al{-}Fannah and Wanpeng Li and Chris J. Mitchell}, title = {Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking}, journal = {CoRR}, volume = {abs/1905.09581}, year = {2019}, url = {http://arxiv.org/abs/1905.09581}, eprinttype = {arXiv}, eprint = {1905.09581}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-09581.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-09330, author = {Chris J. Mitchell}, title = {The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure}, journal = {CoRR}, volume = {abs/1906.09330}, year = {2019}, url = {http://arxiv.org/abs/1906.09330}, eprinttype = {arXiv}, eprint = {1906.09330}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-09330.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-07583, author = {Chris J. Mitchell}, title = {The impact of quantum computing on real-world security: {A} 5G case study}, journal = {CoRR}, volume = {abs/1911.07583}, year = {2019}, url = {http://arxiv.org/abs/1911.07583}, eprinttype = {arXiv}, eprint = {1911.07583}, timestamp = {Mon, 02 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-07583.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChenHM18, author = {Liqun Chen and Jinguang Han and Chris J. Mitchell}, title = {Message from the Guest Editors}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {5}, pages = {491--492}, year = {2018}, url = {https://doi.org/10.1007/s10207-018-0416-2}, doi = {10.1007/S10207-018-0416-2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChenHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/MaqbaliM18, author = {Fatma Al Maqbali and Chris J. Mitchell}, title = {Email-based Password Recovery - Risking or Rescuing Users?}, booktitle = {2018 International Carnahan Conference on Security Technology, {ICCST} 2018, Montreal, QC, Canada, October 22-25, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CCST.2018.8585576}, doi = {10.1109/CCST.2018.8585576}, timestamp = {Wed, 09 Mar 2022 16:39:53 +0100}, biburl = {https://dblp.org/rec/conf/iccst/MaqbaliM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Al-FannahLM18, author = {Nasser Mohammed Al{-}Fannah and Wanpeng Li and Chris J. Mitchell}, editor = {Liqun Chen and Mark Manulis and Steve A. Schneider}, title = {Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking}, booktitle = {Information Security - 21st International Conference, {ISC} 2018, Guildford, UK, September 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11060}, pages = {481--501}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99136-8\_26}, doi = {10.1007/978-3-319-99136-8\_26}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/isw/Al-FannahLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/LiMC18, author = {Wanpeng Li and Chris J. Mitchell and Thomas M. Chen}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {Mitigating {CSRF} attacks on OAuth 2.0 Systems}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514180}, doi = {10.1109/PST.2018.8514180}, timestamp = {Tue, 20 Aug 2024 07:54:45 +0200}, biburl = {https://dblp.org/rec/conf/pst/LiMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LiMC18, author = {Wanpeng Li and Chris J. Mitchell and Thomas M. Chen}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {24--41}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_3}, doi = {10.1007/978-3-030-03251-7\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LiMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-06730, author = {Fatma Al Maqbali and Chris J. Mitchell}, title = {Web password recovery - a necessary evil?}, journal = {CoRR}, volume = {abs/1801.06730}, year = {2018}, url = {http://arxiv.org/abs/1801.06730}, eprinttype = {arXiv}, eprint = {1801.06730}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-06730.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-07983, author = {Wanpeng Li and Chris J. Mitchell and Thomas M. Chen}, title = {Mitigating {CSRF} attacks on OAuth 2.0 and OpenID Connect}, journal = {CoRR}, volume = {abs/1801.07983}, year = {2018}, url = {http://arxiv.org/abs/1801.07983}, eprinttype = {arXiv}, eprint = {1801.07983}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-07983.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-01137, author = {Chris J. Mitchell}, title = {Security issues in a group key establishment protocol}, journal = {CoRR}, volume = {abs/1803.01137}, year = {2018}, url = {http://arxiv.org/abs/1803.01137}, eprinttype = {arXiv}, eprint = {1803.01137}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-01137.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-05365, author = {Chris J. Mitchell}, title = {The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure}, journal = {CoRR}, volume = {abs/1803.05365}, year = {2018}, url = {http://arxiv.org/abs/1803.05365}, eprinttype = {arXiv}, eprint = {1803.05365}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-05365.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/MaqbaliM17, author = {Fatma Al Maqbali and Chris J. Mitchell}, title = {AutoPass: An automatic password generator}, booktitle = {International Carnahan Conference on Security Technology, {ICCST} 2017, Madrid, Spain, October 23-26, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CCST.2017.8167791}, doi = {10.1109/CCST.2017.8167791}, timestamp = {Wed, 09 Mar 2022 16:39:53 +0100}, biburl = {https://dblp.org/rec/conf/iccst/MaqbaliM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KhanM17, author = {Mohammed Shafiul Alam Khan and Chris J. Mitchell}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Trashing {IMSI} catchers in mobile networks}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {207--218}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098248}, doi = {10.1145/3098243.3098248}, timestamp = {Tue, 06 Nov 2018 16:59:31 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KhanM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2017, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7}, doi = {10.1007/978-3-319-68063-7}, isbn = {978-3-319-68062-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MaqbaliM17, author = {Fatma Al Maqbali and Chris J. Mitchell}, title = {AutoPass: An Automatic Password Generator}, journal = {CoRR}, volume = {abs/1703.01959}, year = {2017}, url = {http://arxiv.org/abs/1703.01959}, eprinttype = {arXiv}, eprint = {1703.01959}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MaqbaliM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JungnickelKMMW16, author = {Dieter Jungnickel and Jennifer D. Key and Chris J. Mitchell and Ronald C. Mullin and Peter R. Wild}, title = {Editorial for the 25th anniversary issue}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {1--3}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0158-3}, doi = {10.1007/S10623-015-0158-3}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/JungnickelKMMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChenM16, author = {Liqun Chen and Chris J. Mitchell}, title = {Message from the guest editors}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {6}, pages = {573--574}, year = {2016}, url = {https://doi.org/10.1007/s10207-016-0353-x}, doi = {10.1007/S10207-016-0353-X}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChenM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Mitchell16, author = {Chris J. Mitchell}, title = {On the Security of 2-Key Triple {DES}}, journal = {{IEEE} Trans. Inf. Theory}, volume = {62}, number = {11}, pages = {6260--6267}, year = {2016}, url = {https://doi.org/10.1109/TIT.2016.2611003}, doi = {10.1109/TIT.2016.2611003}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Mitchell16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/LiM16, author = {Wanpeng Li and Chris J. Mitchell}, editor = {Juan Caballero and Urko Zurutuza and Ricardo J. Rodr{\'{\i}}guez}, title = {Analysing the Security of Google's Implementation of OpenID Connect}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n, Spain, July 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9721}, pages = {357--376}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40667-1\_18}, doi = {10.1007/978-3-319-40667-1\_18}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/LiM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KhanM16, author = {Mohammed Shafiul Alam Khan and Chris J. Mitchell}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Retrofitting Mutual Authentication to {GSM} Using {RAND} Hijacking}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {17--31}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_2}, doi = {10.1007/978-3-319-46598-2\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/KhanM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MaqbaliM16, author = {Fatma Al Maqbali and Chris J. Mitchell}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Password Generators: Old Ideas and New}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {245--253}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_16}, doi = {10.1007/978-3-319-45931-8\_16}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/MaqbaliM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secsr/2016, editor = {Lidong Chen and David A. McGrew and Chris J. Mitchell}, title = {Security Standardisation Research - Third International Conference, {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10074}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49100-4}, doi = {10.1007/978-3-319-49100-4}, isbn = {978-3-319-49099-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Mitchell16, author = {Chris J. Mitchell}, title = {On the security of 2-key triple {DES}}, journal = {CoRR}, volume = {abs/1602.06229}, year = {2016}, url = {http://arxiv.org/abs/1602.06229}, eprinttype = {arXiv}, eprint = {1602.06229}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Mitchell16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KhanM16, author = {Mohammed Shafiul Alam Khan and Chris J. Mitchell}, title = {Retrofitting mutual authentication to {GSM} using {RAND} hijacking}, journal = {CoRR}, volume = {abs/1607.00729}, year = {2016}, url = {http://arxiv.org/abs/1607.00729}, eprinttype = {arXiv}, eprint = {1607.00729}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KhanM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MaqbaliM16, author = {Fatma Al Maqbali and Chris J. Mitchell}, title = {Password Generators: Old Ideas and New}, journal = {CoRR}, volume = {abs/1607.04421}, year = {2016}, url = {http://arxiv.org/abs/1607.04421}, eprinttype = {arXiv}, eprint = {1607.04421}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MaqbaliM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/LiM15, author = {Wanpeng Li and Chris J. Mitchell}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Addressing Threats to Real-World Identity Management Systems}, booktitle = {{ISSE} 2015 - Highlights of the Information Security Solutions Europe 2015 Conference, Berlin, Germany, November 1-2, 2015}, pages = {251--259}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-658-10934-9\_21}, doi = {10.1007/978-3-658-10934-9\_21}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/LiM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/KhanM15, author = {Mohammed Shafiul Alam Khan and Chris J. Mitchell}, editor = {Liqun Chen and Shin'ichiro Matsuo}, title = {Improving Air Interface User Privacy in Mobile Telephony}, booktitle = {Security Standardisation Research - Second International Conference, {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9497}, pages = {165--184}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27152-1\_9}, doi = {10.1007/978-3-319-27152-1\_9}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secsr/KhanM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/KayuniKLMY15, author = {Mwawi Nyirenda Kayuni and Mohammed Shafiul Alam Khan and Wanpeng Li and Chris J. Mitchell and Po{-}Wah Yau}, editor = {Liqun Chen and Shin'ichiro Matsuo}, title = {Generating Unlinkable IPv6 Addresses}, booktitle = {Security Standardisation Research - Second International Conference, {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9497}, pages = {185--199}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27152-1\_10}, doi = {10.1007/978-3-319-27152-1\_10}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/KayuniKLMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2015, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5}, doi = {10.1007/978-3-319-23318-5}, isbn = {978-3-319-23317-8}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KhanM15, author = {Mohammed Shafiul Alam Khan and Chris J. Mitchell}, title = {Improving Air Interface User Privacy in Mobile Telephony}, journal = {CoRR}, volume = {abs/1504.03287}, year = {2015}, url = {http://arxiv.org/abs/1504.03287}, eprinttype = {arXiv}, eprint = {1504.03287}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KhanM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiM15, author = {Wanpeng Li and Chris J. Mitchell}, title = {Analysing the Security of Google's implementation of OpenID Connect}, journal = {CoRR}, volume = {abs/1508.01707}, year = {2015}, url = {http://arxiv.org/abs/1508.01707}, eprinttype = {arXiv}, eprint = {1508.01707}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KhanM14, author = {Mohammed Shafiul Alam Khan and Chris J. Mitchell}, editor = {Willy Susilo and Yi Mu}, title = {Another Look at Privacy Threats in 3G Mobile Telephony}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {386--396}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_25}, doi = {10.1007/978-3-319-08344-5\_25}, timestamp = {Thu, 14 Oct 2021 10:41:30 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KhanM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LiM14, author = {Wanpeng Li and Chris J. Mitchell}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Security Issues in OAuth 2.0 {SSO} Implementations}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {529--541}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_34}, doi = {10.1007/978-3-319-13257-0\_34}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LiM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secsr/2014, editor = {Liqun Chen and Chris J. Mitchell}, title = {Security Standardisation Research - First International Conference, {SSR} 2014, London, UK, December 16-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8893}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14054-4}, doi = {10.1007/978-3-319-14054-4}, isbn = {978-3-319-14053-7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/0002MT13, author = {Chunhua Chen and Chris J. Mitchell and Shaohua Tang}, title = {Ubiquitous One-Time Password Service Using the Generic Authentication Architecture}, journal = {Mob. Networks Appl.}, volume = {18}, number = {5}, pages = {738--747}, year = {2013}, url = {https://doi.org/10.1007/s11036-011-0329-z}, doi = {10.1007/S11036-011-0329-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/0002MT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Al-SinaniM13, author = {Haitham S. Al{-}Sinani and Chris J. Mitchell}, title = {Enabling interoperation between Shibboleth and Information Card systems}, journal = {Secur. Commun. Networks}, volume = {6}, number = {2}, pages = {219--229}, year = {2013}, url = {https://doi.org/10.1002/sec.560}, doi = {10.1002/SEC.560}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Al-SinaniM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Mitchell13, author = {Chris J. Mitchell}, editor = {Colin Boyd and Leonie Simpson}, title = {Analysing the {IOBC} Authenticated Encryption Mode}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {1--12}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_1}, doi = {10.1007/978-3-642-39059-3\_1}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Mitchell13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/europki/2012, editor = {Sabrina De Capitani di Vimercati and Chris J. Mitchell}, title = {Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7868}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40012-4}, doi = {10.1007/978-3-642-40012-4}, isbn = {978-3-642-40011-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/idman/2013, editor = {Simone Fischer{-}H{\"{u}}bner and Elisabeth de Leeuw and Chris J. Mitchell}, title = {Policies and Research in Identity Management - Third {IFIP} {WG} 11.6 Working Conference, {IDMAN} 2013, London, UK, April 8-9, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {396}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37282-7}, doi = {10.1007/978-3-642-37282-7}, isbn = {978-3-642-37281-0}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idman/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KoungaMW12, author = {Gina Kounga and Chris J. Mitchell and Thomas Walter}, title = {Generating certification authority authenticated public keys in \emph{ad hoc} networks}, journal = {Secur. Commun. Networks}, volume = {5}, number = {1}, pages = {87--106}, year = {2012}, url = {https://doi.org/10.1002/sec.279}, doi = {10.1002/SEC.279}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KoungaMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/0002TM12, author = {Chunhua Chen and Shaohua Tang and Chris J. Mitchell}, editor = {Angelos D. Keromytis and Roberto Di Pietro}, title = {Building General-Purpose Security Services on {EMV} Payment Cards}, booktitle = {Security and Privacy in Communication Networks - 8th International {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {106}, pages = {29--44}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36883-7\_3}, doi = {10.1007/978-3-642-36883-7\_3}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/0002TM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2012, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0}, doi = {10.1007/978-3-642-35371-0}, isbn = {978-3-642-35370-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SongM11, author = {Boyeon Song and Chris J. Mitchell}, title = {Scalable {RFID} security protocols supporting tag ownership transfer}, journal = {Comput. Commun.}, volume = {34}, number = {4}, pages = {556--566}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.02.027}, doi = {10.1016/J.COMCOM.2010.02.027}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/SongM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Al-SinaniM11, author = {Haitham S. Al{-}Sinani and Chris J. Mitchell}, editor = {Yingjiu Li}, title = {Enhancing CardSpace Authentication Using a Mobile Device}, booktitle = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP} {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6818}, pages = {201--216}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22348-8\_16}, doi = {10.1007/978-3-642-22348-8\_16}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Al-SinaniM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/Al-SinaniM11, author = {Haitham S. Al{-}Sinani and Chris J. Mitchell}, editor = {Svetla Petkova{-}Nikova and Andreas Pashalidis and G{\"{u}}nther Pernul}, title = {A Universal Client-Based Identity Management Tool}, booktitle = {Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7163}, pages = {49--74}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29804-2\_4}, doi = {10.1007/978-3-642-29804-2\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/Al-SinaniM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ChenMT11, author = {Chunhua Chen and Chris J. Mitchell and Shaohua Tang}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Building General Purpose Security Services on Trusted Computing}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {16--31}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_2}, doi = {10.1007/978-3-642-32298-3\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ChenMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/Al-SinaniM11, author = {Haitham S. Al{-}Sinani and Chris J. Mitchell}, editor = {Erol Gelenbe and Ricardo Lent and Georgia Sakellari}, title = {Client-Based CardSpace-OpenID Interoperation}, booktitle = {Computer and Information Sciences {II} - 26th International Symposium on Computer and Information Sciences, London, UK, 26-28 September 2011}, pages = {387--393}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4471-2155-8\_49}, doi = {10.1007/978-1-4471-2155-8\_49}, timestamp = {Sat, 16 Sep 2017 12:11:33 +0200}, biburl = {https://dblp.org/rec/conf/iscis/Al-SinaniM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Al-SinaniM11, author = {Haitham S. Al{-}Sinani and Chris J. Mitchell}, editor = {Mehmet A. Orgun and Atilla El{\c{c}}i and Oleg B. Makarevich and Sorin A. Huss and Josef Pieprzyk and Lyudmila K. Babenko and Alexander G. Chefranov and Rajan Shankaran}, title = {Extending the Scope of cardspace}, booktitle = {Proceedings of the 4th International Conference on Security of Information and Networks, {SIN} 2011, Sydney, NSW, Australia, November 14-19, 2011}, pages = {235--238}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2070425.2070467}, doi = {10.1145/2070425.2070467}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Al-SinaniM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ChenMT11, author = {Chunhua Chen and Chris J. Mitchell and Shaohua Tang}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {{SSL/TLS} Session-Aware User Authentication Using a {GAA} Bootstrapped Key}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {54--68}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_4}, doi = {10.1007/978-3-642-21040-2\_4}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/ChenMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/ChenM10, author = {Liqun Chen and Chris J. Mitchell}, title = {Parsing ambiguities in authentication and key establishment protocols}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {1}, pages = {82--94}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.032333}, doi = {10.1504/IJESDF.2010.032333}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/ChenM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/AlrodhanM10, author = {Waleed A. Alrodhan and Chris J. Mitchell}, editor = {Waleed W. Smari and William K. McQuay}, title = {Enhancing user authentication in claim-based identity management}, booktitle = {2010 International Symposium on Collaborative Technologies and Systems, {CTS} 2010, Chicago, Illinois, USA, May 17-21, 2010}, pages = {75--83}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CTS.2010.5478521}, doi = {10.1109/CTS.2010.5478521}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cts/AlrodhanM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idman/Al-SinaniM10, author = {Haitham S. Al{-}Sinani and Chris J. Mitchell}, editor = {Elisabeth de Leeuw and Simone Fischer{-}H{\"{u}}bner and Lothar Fritsch}, title = {Using CardSpace as a Password Manager}, booktitle = {Policies and Research in Identity Management - Second {IFIP} {WG} 11.6 Working Conference, {IDMAN} 2010, Oslo, Norway, November 18-19, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {343}, pages = {18--30}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17303-5\_2}, doi = {10.1007/978-3-642-17303-5\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idman/Al-SinaniM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idtrust/Al-SinaniAM10, author = {Haitham S. Al{-}Sinani and Waleed A. Alrodhan and Chris J. Mitchell}, editor = {Ken Klingenstein and Carl M. Ellison}, title = {CardSpace-liberty integration for CardSpace users}, booktitle = {Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010}, pages = {12--25}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1750389.1750392}, doi = {10.1145/1750389.1750392}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idtrust/Al-SinaniAM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GalleryM09, author = {Eimear Gallery and Chris J. Mitchell}, title = {Trusted Computing: Security and Applications}, journal = {Cryptologia}, volume = {33}, number = {3}, pages = {217--245}, year = {2009}, url = {https://doi.org/10.1080/01611190802231140}, doi = {10.1080/01611190802231140}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GalleryM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/AlrodhanM09, author = {Waleed A. Alrodhan and Chris J. Mitchell}, title = {Improving the Security of CardSpace}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/167216}, doi = {10.1155/2009/167216}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/AlrodhanM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SongM09, author = {Boyeon Song and Chris J. Mitchell}, editor = {Yang Xiang and Javier L{\'{o}}pez and Haining Wang and Wanlei Zhou}, title = {Scalable {RFID} Pseudonym Protocol}, booktitle = {Third International Conference on Network and System Security, {NSS} 2009, Gold Coast, Queensland, Australia, October 19-21, 2009}, pages = {216--224}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NSS.2009.15}, doi = {10.1109/NSS.2009.15}, timestamp = {Thu, 15 Aug 2024 07:54:34 +0200}, biburl = {https://dblp.org/rec/conf/nss/SongM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mitchell09, author = {Chris J. Mitchell}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {A Novel Stateless Authentication Protocol}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {269--274}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_29}, doi = {10.1007/978-3-642-36213-2\_29}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mitchell09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mitchell09a, author = {Chris J. Mitchell}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {A Novel Stateless Authentication Protocol}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {275--281}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_30}, doi = {10.1007/978-3-642-36213-2\_30}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mitchell09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2009, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7}, doi = {10.1007/978-3-642-11145-7}, isbn = {978-3-642-11144-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2009, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9}, doi = {10.1007/978-3-642-00587-9}, isbn = {978-3-642-00586-2}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2009, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7}, doi = {10.1007/978-3-642-03944-7}, isbn = {978-3-642-03943-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BalfeGMP08, author = {Shane Balfe and Eimear Gallery and Chris J. Mitchell and Kenneth G. Paterson}, title = {Challenges for Trusted Computing}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {6}, pages = {60--66}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.138}, doi = {10.1109/MSP.2008.138}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BalfeGMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KalogridisM08, author = {Georgios Kalogridis and Chris J. Mitchell}, title = {Using Non-adaptive Group Testing to Construct Spy Agent Routes}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {1013--1019}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.169}, doi = {10.1109/ARES.2008.169}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KalogridisM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/LeungM08, author = {Adrian Leung and Chris J. Mitchell}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Device Management Framework for Secure Ubiquitous Service Delivery}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {267--274}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.28}, doi = {10.1109/IAS.2008.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/LeungM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idtrust/AlrodhanM08, author = {Waleed A. Alrodhan and Chris J. Mitchell}, editor = {Kent E. Seamons and Neal McBurnett and Tim Polk}, title = {A client-side CardSpace-Liberty integration architecture}, booktitle = {IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, {USA}}, series = {{ACM} International Conference Proceeding Series}, volume = {283}, pages = {1--7}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1373290.1373292}, doi = {10.1145/1373290.1373292}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idtrust/AlrodhanM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LeungCM08, author = {Adrian Leung and Liqun Chen and Chris J. Mitchell}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {On a Possible Privacy Flaw in Direct Anonymous Attestation {(DAA)}}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {179--190}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_14}, doi = {10.1007/978-3-540-68979-9\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/LeungCM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SongM08, author = {Boyeon Song and Chris J. Mitchell}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {{RFID} authentication protocol for low-cost tags}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {140--147}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352556}, doi = {10.1145/1352533.1352556}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SongM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenM08, author = {Liqun Chen and Chris J. Mitchell}, title = {Parsing ambiguities in authentication and key establishment protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2008}, url = {http://eprint.iacr.org/2008/419}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MitchellPW07, author = {Chris J. Mitchell and Fred Piper and Peter R. Wild}, title = {ID-based cryptography using symmetric primitives}, journal = {Des. Codes Cryptogr.}, volume = {44}, number = {1-3}, pages = {249--262}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9095-0}, doi = {10.1007/S10623-007-9095-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MitchellPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMicec/AbbadiM07, author = {Imad M. Abbadi and Chris J. Mitchell}, editor = {Maria L. Gini and Robert J. Kauffman and Donna Sarppo and Chrysanthos Dellarocas and Frank Dignum}, title = {Digital rights management using a mobile phone}, booktitle = {Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007, University of Minnesota, Minneapolis, MN, USA, August 19-22, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {258}, pages = {185--194}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1282100.1282138}, doi = {10.1145/1282100.1282138}, timestamp = {Tue, 06 Apr 2021 12:12:56 +0200}, biburl = {https://dblp.org/rec/conf/ACMicec/AbbadiM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AriyapperumaM07, author = {Suranjith Ariyapperuma and Chris J. Mitchell}, title = {Security vulnerabilities in {DNS} and {DNSSEC}}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {335--342}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.139}, doi = {10.1109/ARES.2007.139}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AriyapperumaM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AlrodhanM07, author = {Waleed A. Alrodhan and Chris J. Mitchell}, editor = {Ning Zhang and Ajith Abraham}, title = {Addressing privacy issues in CardSpace}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {285--291}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.12}, doi = {10.1109/IAS.2007.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AlrodhanM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/GalleryM07, author = {Eimear Gallery and Chris J. Mitchell}, editor = {Alessandro Aldini and Roberto Gorrieri}, title = {Trusted Mobile Platforms}, booktitle = {Foundations of Security Analysis and Design IV, {FOSAD} 2006/2007 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {4677}, pages = {282--323}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74810-6\_10}, doi = {10.1007/978-3-540-74810-6\_10}, timestamp = {Thu, 14 Oct 2021 10:12:35 +0200}, biburl = {https://dblp.org/rec/conf/fosad/GalleryM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/LeungM07, author = {Adrian Leung and Chris J. Mitchell}, editor = {John Krumm and Gregory D. Abowd and Aruna Seneviratne and Thomas Strang}, title = {Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments}, booktitle = {UbiComp 2007: Ubiquitous Computing, 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4717}, pages = {73--90}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74853-3\_5}, doi = {10.1007/978-3-540-74853-3\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/huc/LeungM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Mitchell07, author = {Chris J. Mitchell}, editor = {Steven D. Galbraith}, title = {Cryptanalysis of the {EPBC} Authenticated Encryption Mode}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {118--128}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_8}, doi = {10.1007/978-3-540-77272-9\_8}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/Mitchell07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/Mitchell06, author = {Chris J. Mitchell}, title = {Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauensw{\"{u}}rdiges Rechnen)}, journal = {it Inf. Technol.}, volume = {48}, number = {6}, pages = {321}, year = {2006}, url = {https://doi.org/10.1524/itit.2006.48.6.321}, doi = {10.1524/ITIT.2006.48.6.321}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/Mitchell06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/TangM06, author = {Qiang Tang and Chris J. Mitchell}, title = {Cryptanalysis of a hybrid authentication protocol for large mobile networks}, journal = {J. Syst. Softw.}, volume = {79}, number = {4}, pages = {496--501}, year = {2006}, url = {https://doi.org/10.1016/j.jss.2005.04.022}, doi = {10.1016/J.JSS.2005.04.022}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/TangM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LeungM06, author = {Adrian Leung and Chris J. Mitchell}, editor = {Manu Malek and Eduardo Fern{\'{a}}ndez{-}Medina and Javier Hernando}, title = {A Service Discovery Threat Model for Ad Hoc Networks}, booktitle = {{SECRYPT} 2006, Proceedings of the International Conference on Security and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {167--174}, publisher = {{INSTICC} Press}, year = {2006}, timestamp = {Thu, 18 Oct 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LeungM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NachtigalM06, author = {Sharon Nachtigal and Chris J. Mitchell}, editor = {Manu Malek and Eduardo Fern{\'{a}}ndez{-}Medina and Javier Hernando}, title = {Modelling E-Business Security Using Business Processes}, booktitle = {{SECRYPT} 2006, Proceedings of the International Conference on Security and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {459--464}, publisher = {{INSTICC} Press}, year = {2006}, timestamp = {Thu, 28 Sep 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NachtigalM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mitchell06, author = {Chris J. Mitchell}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {164--170}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_22}, doi = {10.1007/978-3-642-04904-0\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mitchell06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mitchell06a, author = {Chris J. Mitchell}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {171--176}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_23}, doi = {10.1007/978-3-642-04904-0\_23}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mitchell06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RantosM05, author = {Konstantinos Rantos and Chris J. Mitchell}, title = {Matching key recovery mechanisms to business requirements}, journal = {Comput. Secur.}, volume = {24}, number = {3}, pages = {232--245}, year = {2005}, url = {https://doi.org/10.1016/j.cose.2004.08.010}, doi = {10.1016/J.COSE.2004.08.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RantosM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/TangM05, author = {Qiang Tang and Chris J. Mitchell}, title = {Comments on a cryptographic key assignment scheme}, journal = {Comput. Stand. Interfaces}, volume = {27}, number = {3}, pages = {323--326}, year = {2005}, url = {https://doi.org/10.1016/j.csi.2004.07.001}, doi = {10.1016/J.CSI.2004.07.001}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/TangM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/TangM05a, author = {Qiang Tang and Chris J. Mitchell}, title = {Comments on two anonymous conference key distribution systems}, journal = {Comput. Stand. Interfaces}, volume = {27}, number = {4}, pages = {397--400}, year = {2005}, url = {https://doi.org/10.1016/j.csi.2004.08.006}, doi = {10.1016/J.CSI.2004.08.006}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/TangM05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/GajpariaMY05, author = {Anand S. Gajparia and Chris J. Mitchell and Chan Yeob Yeun}, title = {Supporting User Privacy in Location Based Services}, journal = {{IEICE} Trans. Commun.}, volume = {88-B}, number = {7}, pages = {2837--2847}, year = {2005}, url = {https://doi.org/10.1093/ietcom/e88-b.7.2837}, doi = {10.1093/IETCOM/E88-B.7.2837}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/GajpariaMY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlsaidM05, author = {Adil Alsaid and Chris J. Mitchell}, title = {Dynamic content attacks on digital signatures}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {4}, pages = {328--336}, year = {2005}, url = {https://doi.org/10.1108/09685220510614443}, doi = {10.1108/09685220510614443}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AlsaidM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KnudsenM05, author = {Lars R. Knudsen and Chris J. Mitchell}, title = {Partial Key Recovery Attack Against {RMAC}}, journal = {J. Cryptol.}, volume = {18}, number = {4}, pages = {375--389}, year = {2005}, url = {https://doi.org/10.1007/s00145-004-0324-7}, doi = {10.1007/S00145-004-0324-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KnudsenM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Mitchell05, author = {Chris J. Mitchell}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Cryptanalysis of Two Variants of {PCBC} Mode When Used for Message Integrity}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {560--571}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_47}, doi = {10.1007/11506157\_47}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Mitchell05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TangM05, author = {Qiang Tang and Chris J. Mitchell}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {On the Security of Some Password-Based Key Agreement Schemes}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {149--154}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_22}, doi = {10.1007/11596981\_22}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/TangM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TangM05a, author = {Qiang Tang and Chris J. Mitchell}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Efficient Compilers for Authenticated Group Key Exchange}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {192--197}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_29}, doi = {10.1007/11596981\_29}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/TangM05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/KalogridisMC05, author = {Georgios Kalogridis and Chris J. Mitchell and Gary Clemo}, editor = {Hamid R. Arabnia}, title = {Spy Agents: Evaluating Trust in Remote Environments}, booktitle = {Proceedings of The 2005 International Conference on Security and Management, {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005}, pages = {405--411}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Thu, 18 Oct 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/KalogridisMC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/PriceM05, author = {Geraint Price and Chris J. Mitchell}, editor = {David W. Chadwick and Gansen Zhao}, title = {Interoperation Between a Conventional {PKI} and an ID-Based Infrastructure}, booktitle = {Public Key Infrastructure, Second European {PKI} Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3545}, pages = {73--85}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11533733\_5}, doi = {10.1007/11533733\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/PriceM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/AlsaidM05, author = {Adil Alsaid and Chris J. Mitchell}, editor = {David W. Chadwick and Gansen Zhao}, title = {Installing Fake Root Keys in a {PC}}, booktitle = {Public Key Infrastructure, Second European {PKI} Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3545}, pages = {227--239}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11533733\_16}, doi = {10.1007/11533733\_16}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/AlsaidM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GougetSBCDM05, author = {Aline Gouget and Herv{\'{e}} Sibert and C{\^{o}}me Berbain and Nicolas T. Courtois and Blandine Debraize and Chris J. Mitchell}, editor = {Henri Gilbert and Helena Handschuh}, title = {Analysis of the Bit-Search Generator and Sequence Compression Techniques}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {196--214}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_13}, doi = {10.1007/11502760\_13}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GougetSBCDM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YauPM05, author = {Arnold K. L. Yau and Kenneth G. Paterson and Chris J. Mitchell}, editor = {Henri Gilbert and Helena Handschuh}, title = {Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {299--319}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_20}, doi = {10.1007/11502760\_20}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/YauPM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TangM05, author = {Qiang Tang and Chris J. Mitchell}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Security Properties of Two Authenticated Conference Key Agreement Protocols}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {304--314}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_26}, doi = {10.1007/11602897\_26}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/TangM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Mitchell05, author = {Chris J. Mitchell}, editor = {Nigel P. Smart}, title = {Partial Key Recovery Attacks on XCBC, {TMAC} and {OMAC}}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {155--167}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_11}, doi = {10.1007/11586821\_11}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/Mitchell05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Mitchell05, author = {Chris J. Mitchell}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Error Oracle Attacks on {CBC} Mode: Is There a Future for {CBC} Mode Encryption?}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {244--258}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_18}, doi = {10.1007/11556992\_18}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Mitchell05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/HuM05, author = {Shenglan Hu and Chris J. Mitchell}, editor = {Xiaohua Jia and Jie Wu and Yanxiang He}, title = {Improving {IP} Address Autoconfiguration Security in MANETs Using Trust Modelling}, booktitle = {Mobile Ad-hoc and Sensor Networks, First International Conference, {MSN} 2005, Wuhan, China, December 13-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3794}, pages = {83--92}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599463\_9}, doi = {10.1007/11599463\_9}, timestamp = {Wed, 11 Mar 2020 08:37:17 +0100}, biburl = {https://dblp.org/rec/conf/msn/HuM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/MacDonaldSM05, author = {John A. MacDonald and William G. Sirett and Chris J. Mitchell}, editor = {Ry{\^{o}}ichi Sasaki and Sihan Qing and Eiji Okamoto and Hiroshi Yoshiura}, title = {Overcoming Channel Bandwidth Constraints in Secure {SIM} Applications}, booktitle = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11} 20th International Conference on Information Security {(SEC} 2005), May 30 - June 1, 2005, Chiba, Japan}, series = {{IFIP}}, volume = {181}, pages = {539--550}, publisher = {Springer}, year = {2005}, timestamp = {Fri, 19 May 2017 01:25:10 +0200}, biburl = {https://dblp.org/rec/conf/sec/MacDonaldSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/AlsaidM05, author = {Adil Alsaid and Chris J. Mitchell}, editor = {Christopher Wolf and Stefan Lucks and Po{-}Wah Yau}, title = {A Scanning Tool for {PC} Root Public Key Stores}, booktitle = {WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium}, series = {{LNI}}, volume = {{P-74}}, pages = {45--52}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/24849}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weworc/AlsaidM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangM05, author = {Qiang Tang and Chris J. Mitchell}, title = {Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2005}, url = {http://eprint.iacr.org/2005/047}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangM05a, author = {Qiang Tang and Chris J. Mitchell}, title = {Cryptanalysis of two identification schemes based on an ID-based cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2005}, url = {http://eprint.iacr.org/2005/048}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangM05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangM05b, author = {Qiang Tang and Chris J. Mitchell}, title = {Enhanced password-based key establishment protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2005}, url = {http://eprint.iacr.org/2005/141}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangM05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangM05c, author = {Qiang Tang and Chris J. Mitchell}, title = {On the security of some password-based key agreement schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2005}, url = {http://eprint.iacr.org/2005/156}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangM05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangM05d, author = {Qiang Tang and Chris J. Mitchell}, title = {Weaknesses in a leakage-resilient authenticated key transport protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2005}, url = {http://eprint.iacr.org/2005/173}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangM05d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangM05e, author = {Qiang Tang and Chris J. Mitchell}, title = {Security properties of two provably secure conference key agreement protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2005}, url = {http://eprint.iacr.org/2005/185}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangM05e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangM05f, author = {Qiang Tang and Chris J. Mitchell}, title = {Efficient Compilers for Authenticated Group Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2005}, url = {http://eprint.iacr.org/2005/366}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangM05f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/NgM04, author = {Siaw{-}Lynn Ng and Chris J. Mitchell}, title = {Comments on mutual authentication and key exchange protocols for low power wireless communications}, journal = {{IEEE} Commun. Lett.}, volume = {8}, number = {4}, pages = {262--263}, year = {2004}, url = {https://doi.org/10.1109/LCOMM.2004.825724}, doi = {10.1109/LCOMM.2004.825724}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/NgM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/PashalidisM04, author = {Andreas Pashalidis and Chris J. Mitchell}, editor = {Sokratis K. Katsikas and Stefanos Gritzalis and Javier L{\'{o}}pez}, title = {Using {EMV} Cards for Single Sign-On}, booktitle = {Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3093}, pages = {205--217}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25980-0\_17}, doi = {10.1007/978-3-540-25980-0\_17}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/europki/PashalidisM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/PashalidisM04, author = {Andreas Pashalidis and Chris J. Mitchell}, title = {Impostor: a single sign-on system for use from untrusted devices}, booktitle = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM} '04, Dallas, Texas, USA, 29 November - 3 December 2004}, pages = {2191--2195}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/GLOCOM.2004.1378398}, doi = {10.1109/GLOCOM.2004.1378398}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/PashalidisM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11/PashalidisM04, author = {Andreas Pashalidis and Chris J. Mitchell}, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {A Security Model for Anonymous Credential Systems}, booktitle = {Information Security Management, Education and Privacy, {IFIP} 18th World Computer Congress, {TC11} 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {148}, pages = {183--198}, publisher = {Kluwer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8145-6\_16}, doi = {10.1007/1-4020-8145-6\_16}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11/PashalidisM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PashalidisM04, author = {Andreas Pashalidis and Chris J. Mitchell}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Limits to Anonymity When Using Credentials}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {4--12}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_2}, doi = {10.1007/11861386\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/PashalidisM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mitchell04, author = {Chris J. Mitchell}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Limits to Anonymity When Using Credentials (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {13--19}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_3}, doi = {10.1007/11861386\_3}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mitchell04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangM04, author = {Qiang Tang and Chris J. Mitchell}, title = {Rethinking the security of some authenticated group key agreement schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2004}, url = {http://eprint.iacr.org/2004/363}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/HsuWWM03, author = {Chien{-}Lung Hsu and Tzong{-}Sun Wu and Tzong{-}Chen Wu and Chris J. Mitchell}, title = {Improvement of modified authenticated key agreement protocol}, journal = {Appl. Math. Comput.}, volume = {142}, number = {2-3}, pages = {305--308}, year = {2003}, url = {https://doi.org/10.1016/S0096-3003(02)00304-1}, doi = {10.1016/S0096-3003(02)00304-1}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/HsuWWM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/KnudsenM03, author = {Lars R. Knudsen and Chris J. Mitchell}, title = {Analysis of 3gpp-MAC and Two-key 3gpp-MAC}, journal = {Discret. Appl. Math.}, volume = {128}, number = {1}, pages = {181--191}, year = {2003}, url = {https://doi.org/10.1016/S0166-218X(02)00444-4}, doi = {10.1016/S0166-218X(02)00444-4}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/KnudsenM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PashalidisM03, author = {Andreas Pashalidis and Chris J. Mitchell}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Taxonomy of Single Sign-On Systems}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {249--264}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_22}, doi = {10.1007/3-540-45067-X\_22}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PashalidisM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/RilaM03, author = {Luciano Rila and Chris J. Mitchell}, editor = {Jianying Zhou and Moti Yung and Yongfei Han}, title = {Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards}, booktitle = {Applied Cryptography and Network Security, First International Conference, {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2846}, pages = {254--264}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45203-4\_20}, doi = {10.1007/978-3-540-45203-4\_20}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/RilaM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bled/Al-MeaitherM03, author = {Mansour A. Al{-}Meaither and Chris J. Mitchell}, title = {A Secure Electronic Murabaha Transaction}, booktitle = {16th Bled eConference: eTransformation, Bled, Slovenia, June 9-11, 2003}, pages = {5}, year = {2003}, url = {http://aisel.aisnet.org/bled2003/5}, timestamp = {Mon, 09 Jul 2018 07:55:38 +0200}, biburl = {https://dblp.org/rec/conf/bled/Al-MeaitherM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/BorseliusM03, author = {Niklas Borselius and Chris J. Mitchell}, editor = {Hamid R. Arabnia and Youngsong Mun}, title = {Securing {FIPA} Agent Communication}, booktitle = {Proceedings of the International Conference on Security and Management, {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1}, pages = {135--141}, publisher = {{CSREA} Press}, year = {2003}, timestamp = {Wed, 06 Dec 2006 10:55:26 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/BorseliusM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/Al-MeaitherM03, author = {Mansour A. Al{-}Meaither and Chris J. Mitchell}, editor = {Kurt Bauknecht and A Min Tjoa and Gerald Quirchmayr}, title = {A Secure Electronic Payment Scheme for Charity Donations}, booktitle = {E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2738}, pages = {50--61}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45229-4\_6}, doi = {10.1007/978-3-540-45229-4\_6}, timestamp = {Tue, 29 Dec 2020 18:30:42 +0100}, biburl = {https://dblp.org/rec/conf/ecweb/Al-MeaitherM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/Khu-smithM03, author = {Vorapranee Khu{-}smith and Chris J. Mitchell}, editor = {Kurt Bauknecht and A Min Tjoa and Gerald Quirchmayr}, title = {Enhancing E-commerce Security Using {GSM} Authentication}, booktitle = {E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2738}, pages = {72--83}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45229-4\_8}, doi = {10.1007/978-3-540-45229-4\_8}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecweb/Khu-smithM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Mitchell03, author = {Chris J. Mitchell}, editor = {Kenneth G. Paterson}, title = {Remote User Authentication Using Public Information}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {360--369}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_28}, doi = {10.1007/978-3-540-40974-8\_28}, timestamp = {Wed, 18 Mar 2020 16:01:02 +0100}, biburl = {https://dblp.org/rec/conf/ima/Mitchell03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/PashalidisM03, author = {Andreas Pashalidis and Chris J. Mitchell}, editor = {Colin Boyd and Wenbo Mao}, title = {Single Sign-On Using Trusted Platforms}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {54--68}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_5}, doi = {10.1007/10958513\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/PashalidisM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PagliusiM03, author = {Paulo S. Pagliusi and Chris J. Mitchell}, editor = {Kijoon Chae and Moti Yung}, title = {PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {135--149}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_11}, doi = {10.1007/978-3-540-24591-9\_11}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PagliusiM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/BorseliusMW02, author = {Niklas Borselius and Chris J. Mitchell and Aaron Wilson}, title = {A pragmatic alternative to undetachable signatures}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {36}, number = {2}, pages = {6--11}, year = {2002}, url = {https://doi.org/10.1145/509526.509529}, doi = {10.1145/509526.509529}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/BorseliusMW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/BorseliusMW02a, author = {Niklas Borselius and Chris J. Mitchell and Aaron Wilson}, title = {On the value of threshold signatures}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {36}, number = {4}, pages = {30--35}, year = {2002}, url = {https://doi.org/10.1145/583800.583804}, doi = {10.1145/583800.583804}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/BorseliusMW02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/HornMM02, author = {G{\"{u}}nther Horn and Keith M. Martin and Chris J. Mitchell}, title = {Authentication protocols for mobile network environment value-added services}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {51}, number = {2}, pages = {383--392}, year = {2002}, url = {https://doi.org/10.1109/25.994813}, doi = {10.1109/25.994813}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/HornMM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/RilaM02, author = {Luciano Rila and Chris J. Mitchell}, editor = {Peter Honeyman}, title = {Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication}, booktitle = {Proceedings of the Fifth Smart Card Research and Advanced Application Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}}, publisher = {{USENIX}}, year = {2002}, url = {http://www.usenix.org/publications/library/proceedings/cardis02/rila.html}, timestamp = {Wed, 04 Jul 2018 13:06:35 +0200}, biburl = {https://dblp.org/rec/conf/cardis/RilaM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/MitchellH02, author = {Chris J. Mitchell and Namhyun Hur}, editor = {Borka Jerman{-}Blazic and Tomaz Klobucar}, title = {On the security of a structural proven signer ordering multisignature scheme}, booktitle = {Advanced Communications and Multimedia Security, {IFIP} {TC6/TC11} Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia}, series = {{IFIP} Conference Proceedings}, volume = {228}, pages = {1--8}, publisher = {Kluwer}, year = {2002}, url = {https://doi.org/10.1007/978-0-387-35612-9\_1}, doi = {10.1007/978-0-387-35612-9\_1}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/MitchellH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/Al-RiyamiM02, author = {Sattam S. Al{-}Riyami and Chris J. Mitchell}, editor = {Borka Jerman{-}Blazic and Tomaz Klobucar}, title = {Renewing crytographic timestamps}, booktitle = {Advanced Communications and Multimedia Security, {IFIP} {TC6/TC11} Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia}, series = {{IFIP} Conference Proceedings}, volume = {228}, pages = {9--16}, publisher = {Kluwer}, year = {2002}, url = {https://doi.org/10.1007/978-0-387-35612-9\_2}, doi = {10.1007/978-0-387-35612-9\_2}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/Al-RiyamiM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/Khu-SmithM02, author = {Vorapranee Khu{-}smith and Chris J. Mitchell}, editor = {Kurt Bauknecht and A Min Tjoa and Gerald Quirchmayr}, title = {Using {EMV} Cards to Protect E-commerce Transactions}, booktitle = {E-Commerce and Web Technologies, Third International Conference, EC-Web 2002, Aix-en-Provence, France, September 2-6, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2455}, pages = {388--399}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45705-4\_40}, doi = {10.1007/3-540-45705-4\_40}, timestamp = {Tue, 29 Dec 2020 18:30:42 +0100}, biburl = {https://dblp.org/rec/conf/ecweb/Khu-SmithM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/JarupunpholM02, author = {Pita Jarupunphol and Chris J. Mitchell}, editor = {Jo{\~{a}}o L. Monteiro and Paula M. C. Swatman and Lu{\'{\i}}s Valadares Tavares}, title = {Implementation Aspects of {SET/EMV}}, booktitle = {Towards The Knowledge Society: eCommerce, eBusiness, and eGovernment, The Second {IFIP} Conference on E-Commerce, E-Business, E-Government {(I3E} 2002), October 7-9, 2002, Lisbon, Portugal}, series = {{IFIP} Conference Proceedings}, volume = {233}, pages = {305--315}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 09 Oct 2002 13:14:37 +0200}, biburl = {https://dblp.org/rec/conf/i3e/JarupunpholM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MitchellP02, author = {Chris J. Mitchell and Paulo S. Pagliusi}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Is Entity Authentication Necessary?}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {20--33}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_4}, doi = {10.1007/978-3-540-39871-4\_4}, timestamp = {Sat, 05 Sep 2020 18:04:37 +0200}, biburl = {https://dblp.org/rec/conf/spw/MitchellP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/witasi/JarupunpholM02, author = {Pita Jarupunphol and Chris J. Mitchell}, editor = {Wojciech Cellary and Arun Iyengar}, title = {E-commerce and the Media - Influences on Security Risk Perceptions}, booktitle = {Internet Technologies, Applications and Social Impact, {IFIP} {TC6/WG6.4} Workshop on Internet Technologies, Applications and Social Impact {(WITASI} 2002), October 10-11, 2002, Wroclaw, Poland}, series = {{IFIP} Conference Proceedings}, volume = {232}, pages = {163--174}, publisher = {Kluwer}, year = {2002}, timestamp = {Fri, 18 Oct 2002 12:13:55 +0200}, biburl = {https://dblp.org/rec/conf/witasi/JarupunpholM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmc/Khu-smithM02, author = {Vorapranee Khu{-}smith and Chris J. Mitchell}, editor = {Marisa S. Viveros and Hui Lei and Ouri Wolfson}, title = {Using {GSM} to enhance e-commerce security}, booktitle = {Proceedings of the 2nd International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 28, 2002}, pages = {75--81}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/570705.570720}, doi = {10.1145/570705.570720}, timestamp = {Tue, 10 Mar 2020 16:23:49 +0100}, biburl = {https://dblp.org/rec/conf/wmc/Khu-smithM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/endm/KnudsenM01, author = {Lars R. Knudsen and Chris J. Mitchell}, title = {An analysis of the 3gpp-MAC scheme}, journal = {Electron. Notes Discret. Math.}, volume = {6}, pages = {346--355}, year = {2001}, url = {https://doi.org/10.1016/S1571-0653(04)00186-6}, doi = {10.1016/S1571-0653(04)00186-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/endm/KnudsenM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BrincatM01, author = {Karl Brincat and Chris J. Mitchell}, editor = {Vijay Varadharajan and Yi Mu}, title = {New {CBC-MAC} Forgery Attacks}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {3--14}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_2}, doi = {10.1007/3-540-47719-5\_2}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BrincatM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Khu-smithM01, author = {Vorapranee Khu{-}smith and Chris J. Mitchell}, editor = {Kwangjo Kim}, title = {Enhancing the Security of Cookies}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {132--145}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_11}, doi = {10.1007/3-540-45861-1\_11}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Khu-smithM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BrincatM01, author = {Karl Brincat and Chris J. Mitchell}, editor = {Bahram Honary}, title = {Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {63--72}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_7}, doi = {10.1007/3-540-45325-3\_7}, timestamp = {Wed, 18 Mar 2020 16:01:01 +0100}, biburl = {https://dblp.org/rec/conf/ima/BrincatM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BorseliusMW01, author = {Niklas Borselius and Chris J. Mitchell and Aaron Wilson}, editor = {Bahram Honary}, title = {Undetachable Threshold Signatures}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {239--244}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_21}, doi = {10.1007/3-540-45325-3\_21}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/BorseliusMW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/RantosM01, author = {Konstantinos Rantos and Chris J. Mitchell}, editor = {Bahram Honary}, title = {Key Recovery Scheme Interoperability - {A} Protocol for Mechanism Negotiation}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {268--276}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_23}, doi = {10.1007/3-540-45325-3\_23}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/RantosM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsec/BorseliusMW01, author = {Niklas Borselius and Chris J. Mitchell and Aaron Wilson}, editor = {Bart De Decker and Frank Piessens and Jan Smits and Els Van Herreweghen}, title = {On Mobile Agent Based Transactions in Moderately Hostile Environments}, booktitle = {Advances in Network and Distributed Systems Security, {IFIP} {TC11} {WG11.4} First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {206}, pages = {173--186}, publisher = {Kluwer}, year = {2001}, url = {https://doi.org/10.1007/0-306-46958-8\_12}, doi = {10.1007/0-306-46958-8\_12}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsec/BorseliusMW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Mitchell00, author = {Chris J. Mitchell}, title = {{PKI} standards}, journal = {Inf. Secur. Tech. Rep.}, volume = {5}, number = {4}, pages = {17--32}, year = {2000}, url = {https://doi.org/10.1016/S1363-4127(00)04003-6}, doi = {10.1016/S1363-4127(00)04003-6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Mitchell00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Mitchell00, author = {Chris J. Mitchell}, title = {Making serial number based authentication robust against loss of state}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {34}, number = {3}, pages = {56--59}, year = {2000}, url = {https://doi.org/10.1145/506117.506124}, doi = {10.1145/506117.506124}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Mitchell00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoppersmithKM00, author = {Don Coppersmith and Lars R. Knudsen and Chris J. Mitchell}, editor = {Mihir Bellare}, title = {Key Recovery and Forgery Attacks on the MacDES {MAC} Algorithm}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {184--196}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_11}, doi = {10.1007/3-540-44598-6\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoppersmithKM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/MitchellR99, author = {Chris J. Mitchell and Konstantinos Rantos}, title = {A fair certification protocol}, journal = {Comput. Commun. Rev.}, volume = {29}, number = {3}, pages = {47--49}, year = {1999}, url = {https://doi.org/10.1145/505724.505730}, doi = {10.1145/505724.505730}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccr/MitchellR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmobile/MartinM99, author = {Keith M. Martin and Chris J. Mitchell}, title = {Comments on an optimized protocol for mobile network authentication and security}, journal = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.}, volume = {3}, number = {2}, pages = {37}, year = {1999}, url = {https://doi.org/10.1145/584027.584036}, doi = {10.1145/584027.584036}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmobile/MartinM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/MitchellP98, author = {Chris J. Mitchell and Kenneth G. Paterson}, title = {Perfect Factors from Cyclic Codes and Interleaving}, journal = {{SIAM} J. Discret. Math.}, volume = {11}, number = {2}, pages = {241--264}, year = {1998}, url = {https://doi.org/10.1137/S089548019630649X}, doi = {10.1137/S089548019630649X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/MitchellP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/MitchellY98, author = {Chris J. Mitchell and Chan Yeob Yeun}, title = {Fixing a Problem in the Helsinki Protocol}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {21--24}, year = {1998}, url = {https://doi.org/10.1145/302350.302356}, doi = {10.1145/302350.302356}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/MitchellY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Mitchell98, author = {Chris J. Mitchell}, title = {On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {44}, number = {7}, pages = {3146--3150}, year = {1998}, url = {https://doi.org/10.1109/18.737545}, doi = {10.1109/18.737545}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Mitchell98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RyanGGKM98, author = {Peter Y. A. Ryan and Dieter Gollmann and Li Gong and G{\"{u}}nter Karjoth and Chris J. Mitchell}, title = {Panel Introduction: The Security Impact of Distributed Computing Technologies}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {164--166}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSFW.1998.683166}, doi = {10.1109/CSFW.1998.683166}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RyanGGKM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isn/MartinPMHHPH98, author = {Keith M. Martin and Bart Preneel and Chris J. Mitchell and Hans{-}Joachim Hitz and G{\"{u}}nther Horn and Alla Poliakova and Peter Howard}, editor = {Sebastiano Trigila and Alvin P. Mullery and M{\'{a}}rio Campolargo and Hans Vanderstraeten and Marcel Mampaey}, title = {Secure Billing for Mobile Information Services in {UMTS}}, booktitle = {Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 5th International Conference on Intelligence and Services in Networks, IS{\&}N'98, Antwerp, Belgium, May 25-28, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1430}, pages = {535--548}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0056997}, doi = {10.1007/BFB0056997}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isn/MartinPMHHPH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/HanMG97, author = {Yongfei Han and Chris J. Mitchell and Dieter Gollmann}, title = {A fast modular exponentiation for rsa on systolic arrays}, journal = {Int. J. Comput. Math.}, volume = {63}, number = {3-4}, pages = {215--226}, year = {1997}, url = {https://doi.org/10.1080/00207169708804562}, doi = {10.1080/00207169708804562}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcm/HanMG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Mitchell97, author = {Chris J. Mitchell}, title = {Authentication using cryptography}, journal = {Inf. Secur. Tech. Rep.}, volume = {2}, number = {2}, pages = {25--32}, year = {1997}, url = {https://doi.org/10.1016/S1363-4127(97)81326-X}, doi = {10.1016/S1363-4127(97)81326-X}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Mitchell97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/Mitchell97, author = {Chris J. Mitchell}, title = {De Bruijn Sequences and Perfect Factors}, journal = {{SIAM} J. Discret. Math.}, volume = {10}, number = {2}, pages = {270--281}, year = {1997}, url = {https://doi.org/10.1137/S0895480195290911}, doi = {10.1137/S0895480195290911}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/Mitchell97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/ChenGM97, author = {Liqun Chen and Dieter Gollmann and Chris J. Mitchell}, title = {Authentication Using Minimally Trusted Servers}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {31}, number = {3}, pages = {16--28}, year = {1997}, url = {https://doi.org/10.1145/270555.270557}, doi = {10.1145/270555.270557}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/ChenGM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/HoyleM97, author = {Mark P. Hoyle and Chris J. Mitchell}, editor = {Bart Preneel and Vincent Rijmen}, title = {On Solutions to the Key Escrow Problem}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {277--306}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_13}, doi = {10.1007/3-540-49248-8\_13}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/HoyleM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenGMW97, author = {Liqun Chen and Dieter Gollmann and Chris J. Mitchell and Peter R. Wild}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {Secret Sharing with Reusable Polynomials}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {183--193}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027925}, doi = {10.1007/BFB0027925}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenGMW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChenM97, author = {Liqun Chen and Chris J. Mitchell}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {An anonymous and undeniable payment scheme}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {478--482}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028504}, doi = {10.1007/BFB0028504}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChenM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MitchellPWW96, author = {Chris J. Mitchell and Fred Piper and Michael Walker and Peter R. Wild}, title = {Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {101--110}, year = {1996}, url = {https://doi.org/10.1023/A:1018052831124}, doi = {10.1023/A:1018052831124}, timestamp = {Tue, 12 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MitchellPWW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GollmannHM96, author = {Dieter Gollmann and Yongfei Han and Chris J. Mitchell}, title = {Redundant Integer Representations and Fast Exponentiation}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {135--151}, year = {1996}, url = {https://doi.org/10.1023/A:1018013116103}, doi = {10.1023/A:1018013116103}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GollmannHM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Mitchell96, author = {Chris J. Mitchell}, title = {The royal holloway TTP-based key escrow scheme}, journal = {Inf. Secur. Tech. Rep.}, volume = {1}, number = {1}, pages = {63--69}, year = {1996}, url = {https://doi.org/10.1016/1363-4127(96)89811-6}, doi = {10.1016/1363-4127(96)89811-6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Mitchell96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/HurlbertMP96, author = {Glenn Hurlbert and Chris J. Mitchell and Kenneth G. Paterson}, title = {On the Existence of de Bruijn Tori with Two by Two Windows}, journal = {J. Comb. Theory {A}}, volume = {76}, number = {2}, pages = {213--230}, year = {1996}, url = {https://doi.org/10.1006/jcta.1996.0102}, doi = {10.1006/JCTA.1996.0102}, timestamp = {Fri, 07 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jct/HurlbertMP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/MitchellC96, author = {Chris J. Mitchell and Liqun Chen}, title = {Comments on the {S/KEY} User Authentication Scheme}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {30}, number = {4}, pages = {12--16}, year = {1996}, url = {https://doi.org/10.1145/240799.240801}, doi = {10.1145/240799.240801}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/MitchellC96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MitchellEP96, author = {Chris J. Mitchell and Tuvi Etzion and Kenneth G. Paterson}, title = {A method for constructing decodable de Bruijn sequences}, journal = {{IEEE} Trans. Inf. Theory}, volume = {42}, number = {5}, pages = {1472--1478}, year = {1996}, url = {https://doi.org/10.1109/18.532887}, doi = {10.1109/18.532887}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MitchellEP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenGM96, author = {Liqun Chen and Dieter Gollmann and Chris J. Mitchell}, editor = {Josef Pieprzyk and Jennifer Seberry}, title = {Tailoring authentication protocols to match underlying mechanisms}, booktitle = {Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1172}, pages = {121--133}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0023293}, doi = {10.1007/BFB0023293}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenGM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChenGM96, author = {Liqun Chen and Dieter Gollmann and Chris J. Mitchell}, editor = {T. Mark A. Lomas}, title = {Key Escrow in Mutually Mistrusting Domains}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {139--153}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_14}, doi = {10.1007/3-540-62494-5\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChenGM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChenGM95, author = {Liqun Chen and Dieter Gollmann and Chris J. Mitchell}, title = {Distributing Trust Amongst Multiple Authentication Servers}, journal = {J. Comput. Secur.}, volume = {3}, number = {4}, pages = {255--268}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3403}, doi = {10.3233/JCS-1994/1995-3403}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ChenGM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Mitchell95, author = {Chris J. Mitchell}, title = {Aperiodic and semi-periodic perfect maps}, journal = {{IEEE} Trans. Inf. Theory}, volume = {41}, number = {1}, pages = {88--95}, year = {1995}, url = {https://doi.org/10.1109/18.370116}, doi = {10.1109/18.370116}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Mitchell95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpa/JefferiesMW95, author = {Nigel Jefferies and Chris J. Mitchell and Michael Walker}, editor = {Ed Dawson and Jovan Dj. Golic}, title = {A Proposed Architecture for Trusted Third Party Services}, booktitle = {Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1029}, pages = {98--104}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0032349}, doi = {10.1007/BFB0032349}, timestamp = {Tue, 12 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cpa/JefferiesMW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChenGM95, author = {Liqun Chen and Dieter Gollmann and Chris J. Mitchell}, title = {Key distribution without individual trusted authentification servers}, booktitle = {The Eighth {IEEE} Computer Security Foundations Workshop {(CSFW} '95), March 13-15, 1995, Kenmare, County Kerry, Ireland}, pages = {30}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/CSFW.1995.518550}, doi = {10.1109/CSFW.1995.518550}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChenGM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/HanGM95, author = {Yongfei Han and Dieter Gollmann and Chris J. Mitchell}, editor = {Colin Boyd}, title = {Minimal Weight k-SR Representations}, booktitle = {Cryptography and Coding, 5th {IMA} Conference, Cirencester, UK, December 18-20, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1025}, pages = {34--43}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60693-9\_6}, doi = {10.1007/3-540-60693-9\_6}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/HanGM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Mitchell95, author = {Chris J. Mitchell}, editor = {Colin Boyd}, title = {A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels}, booktitle = {Cryptography and Coding, 5th {IMA} Conference, Cirencester, UK, December 18-20, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1025}, pages = {84--93}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60693-9\_11}, doi = {10.1007/3-540-60693-9\_11}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Mitchell95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MitchellP94, author = {Chris J. Mitchell and Kenneth G. Paterson}, title = {Decoding Perfect Maps}, journal = {Des. Codes Cryptogr.}, volume = {4}, number = {1}, pages = {11--30}, year = {1994}, url = {https://doi.org/10.1007/BF01388557}, doi = {10.1007/BF01388557}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MitchellP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Mitchell94, author = {Chris J. Mitchell}, title = {Constructing c-ary Perfect Factors}, journal = {Des. Codes Cryptogr.}, volume = {4}, number = {4}, pages = {341--368}, year = {1994}, url = {https://doi.org/10.1007/BF01388650}, doi = {10.1007/BF01388650}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Mitchell94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/JedwabMPW94, author = {Jonathan Jedwab and Chris J. Mitchell and Fred Piper and Peter R. Wild}, title = {Perfect binary arrays and difference sets}, journal = {Discret. Math.}, volume = {125}, number = {1-3}, pages = {241--254}, year = {1994}, url = {https://doi.org/10.1016/0012-365X(94)90165-1}, doi = {10.1016/0012-365X(94)90165-1}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/JedwabMPW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/MitchellWW94, author = {Chris J. Mitchell and Michael Walker and Peter R. Wild}, title = {The Combinatorics of Perfect Authentication Schemes}, journal = {{SIAM} J. Discret. Math.}, volume = {7}, number = {1}, pages = {102--107}, year = {1994}, url = {https://doi.org/10.1137/S0895480190178187}, doi = {10.1137/S0895480190178187}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/MitchellWW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BurnsM94, author = {John Burns and Chris J. Mitchell}, title = {Parameter Selection for Server-Aided {RSA} Computation Schemes}, journal = {{IEEE} Trans. Computers}, volume = {43}, number = {2}, pages = {163--174}, year = {1994}, url = {https://doi.org/10.1109/12.262121}, doi = {10.1109/12.262121}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/BurnsM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MitchellT93, author = {Chris J. Mitchell and Andy Thomas}, title = {Standardising Authentication Protocols Based on Public-Key Techniques}, journal = {J. Comput. Secur.}, volume = {2}, pages = {23--36}, year = {1993}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MitchellT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Mitchell92, author = {Chris J. Mitchell}, title = {Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional {MAC} is Insecure}, journal = {{IEEE} Trans. Computers}, volume = {41}, number = {4}, pages = {505--507}, year = {1992}, url = {https://doi.org/10.1109/12.135563}, doi = {10.1109/12.135563}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Mitchell92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MitchellV91, author = {Chris J. Mitchell and Vijay Varadharajan}, title = {Modified forms of cipher block chaining}, journal = {Comput. Secur.}, volume = {10}, number = {1}, pages = {37--40}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90054-H}, doi = {10.1016/0167-4048(91)90054-H}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MitchellV91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/IAnsonM90, author = {Colin I'Anson and Chris J. Mitchell}, title = {Security defects in {CCITT} recommendation {X.509:} the directory authentication framework}, journal = {Comput. Commun. Rev.}, volume = {20}, number = {2}, pages = {30--34}, year = {1990}, url = {https://doi.org/10.1145/378570.378623}, doi = {10.1145/378570.378623}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/IAnsonM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MitchellRW90, author = {Chris J. Mitchell and Dave Rush and Michael Walker}, title = {A Secure Messaging Architecture Implementing the {X.400-1988} Security Features}, journal = {Comput. J.}, volume = {33}, number = {4}, pages = {290--295}, year = {1990}, url = {https://doi.org/10.1093/comjnl/33.4.290}, doi = {10.1093/COMJNL/33.4.290}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MitchellRW90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BurnsM90, author = {John Burns and Chris J. Mitchell}, title = {A security scheme for resource sharing over a network}, journal = {Comput. Secur.}, volume = {9}, number = {1}, pages = {67--75}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90159-Q}, doi = {10.1016/0167-4048(90)90159-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BurnsM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Mitchell90, author = {Chris J. Mitchell}, title = {Enumerating Boolean Functions of Cryptographic Significance}, journal = {J. Cryptol.}, volume = {2}, number = {3}, pages = {155--170}, year = {1990}, url = {https://doi.org/10.1007/BF00190802}, doi = {10.1007/BF00190802}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Mitchell90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GodlewskiM90, author = {Philippe Godlewski and Chris J. Mitchell}, title = {Key-Minimal Crytosystems for Unconditional Secrecy}, journal = {J. Cryptol.}, volume = {3}, number = {1}, pages = {1--25}, year = {1990}, url = {https://doi.org/10.1007/BF00203966}, doi = {10.1007/BF00203966}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GodlewskiM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Mitchell89, author = {Chris J. Mitchell}, title = {Multi-Destination Secure Electronic Mail}, journal = {Comput. J.}, volume = {32}, number = {1}, pages = {13--15}, year = {1989}, url = {https://doi.org/10.1093/comjnl/32.1.13}, doi = {10.1093/COMJNL/32.1.13}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Mitchell89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Mitchell89a, author = {Chris J. Mitchell}, title = {Another Postage Stamp Problem}, journal = {Comput. J.}, volume = {32}, number = {4}, pages = {374--376}, year = {1989}, url = {https://doi.org/10.1093/comjnl/32.4.374}, doi = {10.1093/COMJNL/32.4.374}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Mitchell89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MitchellRW89, author = {Chris J. Mitchell and Dave Rush and Michael Walker}, title = {A remark on hash functions for message authentication}, journal = {Comput. Secur.}, volume = {8}, number = {1}, pages = {55--58}, year = {1989}, url = {https://doi.org/10.1016/0167-4048(89)90039-4}, doi = {10.1016/0167-4048(89)90039-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MitchellRW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/MitchellW89, author = {Chris J. Mitchell and Peter R. Wild}, title = {One-stage one-sided rearrangeable switching networks}, journal = {{IEEE} Trans. Commun.}, volume = {37}, number = {1}, pages = {52--56}, year = {1989}, url = {https://doi.org/10.1109/26.21653}, doi = {10.1109/26.21653}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/MitchellW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GodlewskiM89, author = {Philippe Godlewski and Chris J. Mitchell}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {Key Minimal Authentication Systems for Unconditional Secrecy}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {497--501}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_48}, doi = {10.1007/3-540-46885-4\_48}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GodlewskiM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MitchellW88, author = {Chris J. Mitchell and Michael Walker}, title = {Solutions to the multidestination secure electronic mail problem}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {483--488}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90201-5}, doi = {10.1016/0167-4048(88)90201-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MitchellW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/MitchellP88, author = {Chris J. Mitchell and Fred Piper}, title = {Key storage in secure networks}, journal = {Discret. Appl. Math.}, volume = {21}, number = {3}, pages = {215--228}, year = {1988}, url = {https://doi.org/10.1016/0166-218X(88)90068-6}, doi = {10.1016/0166-218X(88)90068-6}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/MitchellP88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MitchellP87, author = {Chris J. Mitchell and Fred Piper}, title = {The cost of reducing key-storage requirements in secure networks}, journal = {Comput. Secur.}, volume = {6}, number = {4}, pages = {339--341}, year = {1987}, url = {https://doi.org/10.1016/0167-4048(87)90069-1}, doi = {10.1016/0167-4048(87)90069-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MitchellP87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.