default search action
Chris J. Mitchell
- > Home > Persons > Chris J. Mitchell
Publications
- 2021
- [c103]Marc Sel, Chris J. Mitchell:
Automating the Evaluation of Trustworthiness. TrustBus 2021: 18-31 - [c102]Gaëtan Pradel, Chris J. Mitchell:
Privacy-Preserving Biometric Matching Using Homomorphic Encryption. TrustCom 2021: 494-505 - [i30]Gaëtan Pradel, Chris J. Mitchell:
Privacy-Preserving Biometric Matching Using Homomorphic Encryption. CoRR abs/2111.12372 (2021) - 2020
- [c101]Gaëtan Pradel, Chris J. Mitchell:
Post-quantum Certificates for Electronic Travel Documents. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 56-73 - 2018
- [c98]Fatma Al Maqbali, Chris J. Mitchell:
Email-based Password Recovery - Risking or Rescuing Users? ICCST 2018: 1-5 - [i19]Fatma Al Maqbali, Chris J. Mitchell:
Web password recovery - a necessary evil? CoRR abs/1801.06730 (2018) - 2017
- [c94]Fatma Al Maqbali, Chris J. Mitchell:
AutoPass: An automatic password generator. ICCST 2017: 1-6 - [i15]Fatma Al Maqbali, Chris J. Mitchell:
AutoPass: An Automatic Password Generator. CoRR abs/1703.01959 (2017) - 2016
- [c90]Fatma Al Maqbali, Chris J. Mitchell:
Password Generators: Old Ideas and New. WISTP 2016: 245-253 - [i12]Fatma Al Maqbali, Chris J. Mitchell:
Password Generators: Old Ideas and New. CoRR abs/1607.04421 (2016) - 2011
- [j60]Boyeon Song, Chris J. Mitchell:
Scalable RFID security protocols supporting tag ownership transfer. Comput. Commun. 34(4): 556-566 (2011) - 2009
- [c73]Boyeon Song, Chris J. Mitchell:
Scalable RFID Pseudonym Protocol. NSS 2009: 216-224 - 2008
- [c66]Boyeon Song, Chris J. Mitchell:
RFID authentication protocol for low-cost tags. WISEC 2008: 140-147 - 2007
- [c64]Suranjith Ariyapperuma, Chris J. Mitchell:
Security vulnerabilities in DNS and DNSSEC. ARES 2007: 335-342 - 2006
- [c58]Sharon Nachtigal, Chris J. Mitchell:
Modelling E-Business Security Using Business Processes. SECRYPT 2006: 459-464 - 2005
- [j52]Konstantinos Rantos, Chris J. Mitchell:
Matching key recovery mechanisms to business requirements. Comput. Secur. 24(3): 232-245 (2005) - [j48]Adil Alsaid, Chris J. Mitchell:
Dynamic content attacks on digital signatures. Inf. Manag. Comput. Security 13(4): 328-336 (2005) - [c50]Adil Alsaid, Chris J. Mitchell:
Installing Fake Root Keys in a PC. EuroPKI 2005: 227-239 - [c44]Shenglan Hu, Chris J. Mitchell:
Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling. MSN 2005: 83-92 - [c42]Adil Alsaid, Chris J. Mitchell:
A Scanning Tool for PC Root Public Key Stores. WEWoRC 2005: 45-52 - 2003
- [c35]Luciano Rila, Chris J. Mitchell:
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. ACNS 2003: 254-264 - [c34]Mansour A. Al-Meaither, Chris J. Mitchell:
A Secure Electronic Murabaha Transaction. Bled eConference 2003: 5 - [c32]Mansour A. Al-Meaither, Chris J. Mitchell:
A Secure Electronic Payment Scheme for Charity Donations. EC-Web 2003: 50-61 - [c31]Vorapranee Khu-smith, Chris J. Mitchell:
Enhancing E-commerce Security Using GSM Authentication. EC-Web 2003: 72-83 - [c28]Paulo S. Pagliusi, Chris J. Mitchell:
PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. WISA 2003: 135-149 - 2002
- [c27]Luciano Rila, Chris J. Mitchell:
Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication. CARDIS 2002 - [c26]Chris J. Mitchell, Namhyun Hur:
On the security of a structural proven signer ordering multisignature scheme. Communications and Multimedia Security 2002: 1-8 - [c24]Vorapranee Khu-smith, Chris J. Mitchell:
Using EMV Cards to Protect E-commerce Transactions. EC-Web 2002: 388-399 - [c23]Pita Jarupunphol, Chris J. Mitchell:
Implementation Aspects of SET/EMV. I3E 2002: 305-315 - [c22]Chris J. Mitchell, Paulo S. Pagliusi:
Is Entity Authentication Necessary? Security Protocols Workshop 2002: 20-33 - [c21]Pita Jarupunphol, Chris J. Mitchell:
E-commerce and the Media - Influences on Security Risk Perceptions. WITASI 2002: 163-174 - [c20]Vorapranee Khu-smith, Chris J. Mitchell:
Using GSM to enhance e-commerce security. Workshop Mobile Commerce 2002: 75-81 - 2001
- [c19]Karl Brincat, Chris J. Mitchell:
New CBC-MAC Forgery Attacks. ACISP 2001: 3-14 - [c18]Vorapranee Khu-smith, Chris J. Mitchell:
Enhancing the Security of Cookies. ICISC 2001: 132-145 - [c17]Karl Brincat, Chris J. Mitchell:
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. IMACC 2001: 63-72 - [c15]Konstantinos Rantos, Chris J. Mitchell:
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. IMACC 2001: 268-276 - 1999
- [j37]Chris J. Mitchell, Konstantinos Rantos:
A fair certification protocol. Comput. Commun. Rev. 29(3): 47-49 (1999) - 1997
- [c10]Mark P. Hoyle, Chris J. Mitchell:
On Solutions to the Key Escrow Problem. State of the Art in Applied Cryptography 1997: 277-306 - 1994
- [j16]John Burns, Chris J. Mitchell:
Parameter Selection for Server-Aided RSA Computation Schemes. IEEE Trans. Computers 43(2): 163-174 (1994) - 1993
- [j15]Chris J. Mitchell, Andy Thomas:
Standardising Authentication Protocols Based on Public-Key Techniques. J. Comput. Secur. 2: 23-36 (1993) - 1990
- [j12]Colin I'Anson, Chris J. Mitchell:
Security defects in CCITT recommendation X.509: the directory authentication framework. Comput. Commun. Rev. 20(2): 30-34 (1990) - [j10]John Burns, Chris J. Mitchell:
A security scheme for resource sharing over a network. Comput. Secur. 9(1): 67-75 (1990) - [j8]Philippe Godlewski, Chris J. Mitchell:
Key-Minimal Crytosystems for Unconditional Secrecy. J. Cryptol. 3(1): 1-25 (1990) - 1989
- [c1]Philippe Godlewski, Chris J. Mitchell:
Key Minimal Authentication Systems for Unconditional Secrecy. EUROCRYPT 1989: 497-501
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint