dblp.uni-trier.dewww.uni-trier.de

Chris J. Mitchell

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
105EELiqun Chen, Chris J. Mitchell, Andrew Martin: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings Springer 2009
2008
104EEGeorgios Kalogridis, Chris J. Mitchell: Using Non-adaptive Group Testing to Construct Spy Agent Routes. ARES 2008: 1013-1019
103EEWaleed A. Alrodhan, Chris J. Mitchell: A client-side CardSpace-Liberty integration architecture. IDtrust 2008: 1-7
102EEAdrian Leung, Liqun Chen, Chris J. Mitchell: On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). TRUST 2008: 179-190
101EEBoyeon Song, Chris J. Mitchell: RFID authentication protocol for low-cost tags. WISEC 2008: 140-147
2007
100EESuranjith Ariyapperuma, Chris J. Mitchell: Security vulnerabilities in DNS and DNSSEC. ARES 2007: 335-342
99EEEimear Gallery, Chris J. Mitchell: Trusted Mobile Platforms. FOSAD 2007: 282-323
98EEWaleed A. Alrodhan, Chris J. Mitchell: Addressing privacy issues in CardSpace. IAS 2007: 285-291
97EEImad M. Abbadi, Chris J. Mitchell: Digital rights management using a mobile phone. ICEC 2007: 185-194
96EEChris J. Mitchell: Cryptanalysis of the EPBC Authenticated Encryption Mode. IMA Int. Conf. 2007: 118-128
95EEAdrian Leung, Chris J. Mitchell: Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. Ubicomp 2007: 73-90
94EEChris J. Mitchell, Fred Piper, Peter R. Wild: ID-based cryptography using symmetric primitives. Des. Codes Cryptography 44(1-3): 249-262 (2007)
2006
93 Adrian Leung, Chris J. Mitchell: A Service Discovery Threat Model for Ad Hoc Networks. SECRYPT 2006: 167-174
92 Sharon Nachtigal, Chris J. Mitchell: Modelling E-Business Security Using Business Processes. SECRYPT 2006: 459-464
91EEQiang Tang, Chris J. Mitchell: Cryptanalysis of a hybrid authentication protocol for large mobile networks. Journal of Systems and Software 79(4): 496-501 (2006)
90EEChris J. Mitchell: Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen). it - Information Technology 48(6): 321- (2006)
2005
89EEChris J. Mitchell: Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. ACISP 2005: 560-571
88EEQiang Tang, Chris J. Mitchell: On the Security of Some Password-Based Key Agreement Schemes. CIS (2) 2005: 149-154
87EEQiang Tang, Chris J. Mitchell: Efficient Compilers for Authenticated Group Key Exchange. CIS (2) 2005: 192-197
86EEAdil Alsaid, Chris J. Mitchell: Installing Fake Root Keys in a PC. EuroPKI 2005: 227-239
85EEGeraint Price, Chris J. Mitchell: Interoperation Between a Conventional PKI and an ID-Based Infrastructure. EuroPKI 2005: 73-85
84EEAline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, Chris J. Mitchell: Analysis of the Bit-Search Generator and Sequence Compression Techniques. FSE 2005: 196-214
83EEArnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell: Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. FSE 2005: 299-319
82EEQiang Tang, Chris J. Mitchell: Security Properties of Two Authenticated Conference Key Agreement Protocols. ICICS 2005: 304-314
81EEChris J. Mitchell: Partial Key Recovery Attacks on XCBC, TMAC and OMAC. IMA Int. Conf. 2005: 155-167
80EEChris J. Mitchell: Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? ISC 2005: 244-258
79EEShenglan Hu, Chris J. Mitchell: Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling. MSN 2005: 83-92
78 John A. MacDonald, William G. Sirett, Chris J. Mitchell: Overcoming Channel Bandwidth Constraints in Secure SIM Applications. SEC 2005: 539-550
77 Georgios Kalogridis, Chris J. Mitchell, Gary Clemo: Spy Agents: Evaluating Trust in Remote Environments. Security and Management 2005: 405-411
76 Adil Alsaid, Chris J. Mitchell: A Scanning Tool for PC Root Public Key Stores. WEWoRC 2005: 45-52
75EEKonstantinos Rantos, Chris J. Mitchell: Matching key recovery mechanisms to business requirements. Computers & Security 24(3): 232-245 (2005)
74EEAnand S. Gajparia, Chris J. Mitchell, Chan Yeob Yeun: Supporting User Privacy in Location Based Services. IEICE Transactions 88-B(7): 2837-2847 (2005)
73EELars R. Knudsen, Chris J. Mitchell: Partial Key Recovery Attack Against RMAC. J. Cryptology 18(4): 375-389 (2005)
2004
72EEAndreas Pashalidis, Chris J. Mitchell: Using EMV Cards for Single Sign-On. EuroPKI 2004: 205-217
71 Andreas Pashalidis, Chris J. Mitchell: A Security Model for Anonymous Credential Systems. International Information Security Workshops 2004: 183-198
70EEChris J. Mitchell: Limits to Anonymity When Using Credentials (Transcript of Discussion). Security Protocols Workshop 2004: 13-19
69EEAndreas Pashalidis, Chris J. Mitchell: Limits to Anonymity When Using Credentials. Security Protocols Workshop 2004: 4-12
2003
68EEAndreas Pashalidis, Chris J. Mitchell: A Taxonomy of Single Sign-On Systems. ACISP 2003: 249-264
67EELuciano Rila, Chris J. Mitchell: Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. ACNS 2003: 254-264
66EEMansour A. Al-Meaither, Chris J. Mitchell: A Secure Electronic Payment Scheme for Charity Donations. EC-Web 2003: 50-61
65EEVorapranee Khu-smith, Chris J. Mitchell: Enhancing E-commerce Security Using GSM Authentication. EC-Web 2003: 72-83
64EEChris J. Mitchell: Remote User Authentication Using Public Information. IMA Int. Conf. 2003: 360-369
63EEAndreas Pashalidis, Chris J. Mitchell: Single Sign-On Using Trusted Platforms. ISC 2003: 54-68
62 Niklas Borselius, Chris J. Mitchell: Securing FIPA Agent Communication. Security and Management 2003: 135-141
61EEPaulo S. Pagliusi, Chris J. Mitchell: PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. WISA 2003: 135-149
60EELars R. Knudsen, Chris J. Mitchell: Analysis of 3gpp-MAC and Two-key 3gpp-MAC. Discrete Applied Mathematics 128(1): 181-191 (2003)
2002
59EELuciano Rila, Chris J. Mitchell: Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication. CARDIS 2002
58 Chris J. Mitchell, Namhyun Hur: On the security of a structural proven signer ordering multisignature scheme. Communications and Multimedia Security 2002: 1-8
57 Sattam S. Al-Riyami, Chris J. Mitchell: Renewing crytographic timestamps. Communications and Multimedia Security 2002: 9-16
56EEVorapranee Khu-smith, Chris J. Mitchell: Using EMV Cards to Protect E-commerce Transactions. EC-Web 2002: 388-399
55 Pita Jarupunphol, Chris J. Mitchell: Implementation Aspects of SET/EMV. I3E 2002: 305-315
54EEChris J. Mitchell, Paulo S. Pagliusi: Is Entity Authentication Necessary? Security Protocols Workshop 2002: 20-33
53 Pita Jarupunphol, Chris J. Mitchell: E-commerce and the Media - Influences on Security Risk Perceptions. WITASI 2002: 163-174
52EEVorapranee Khu-smith, Chris J. Mitchell: Using GSM to enhance e-commerce security. Workshop Mobile Commerce 2002: 75-81
51EENiklas Borselius, Chris J. Mitchell, Aaron Wilson: A pragmatic alternative to undetachable signatures. Operating Systems Review 36(2): 6-11 (2002)
50EENiklas Borselius, Chris J. Mitchell, Aaron Wilson: On the value of threshold signatures. Operating Systems Review 36(4): 30-35 (2002)
2001
49EEKarl Brincat, Chris J. Mitchell: New CBC-MAC Forgery Attacks. ACISP 2001: 3-14
48EEVorapranee Khu-smith, Chris J. Mitchell: Enhancing the Security of Cookies. ICISC 2001: 132-145
47EENiklas Borselius, Chris J. Mitchell, Aaron Wilson: Undetachable Threshold Signatures. IMA Int. Conf. 2001: 239-244
46EEKonstantinos Rantos, Chris J. Mitchell: Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. IMA Int. Conf. 2001: 268-276
45EEKarl Brincat, Chris J. Mitchell: Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. IMA Int. Conf. 2001: 63-72
44 Niklas Borselius, Chris J. Mitchell, Aaron Wilson: On Mobile Agent Based Transactions in Moderately Hostile Environments. Network Security 2001: 173-186
43EELars R. Knudsen, Chris J. Mitchell: An analysis of the 3gpp-MAC scheme. Electronic Notes in Discrete Mathematics 6: 346-355 (2001)
2000
42EEDon Coppersmith, Lars R. Knudsen, Chris J. Mitchell: Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. CRYPTO 2000: 184-196
41 Chris J. Mitchell: Making serial number based authentication robust against loss of state. Operating Systems Review 34(3): 56-59 (2000)
1998
40EEPeter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166
39EEKeith M. Martin, Bart Preneel, Chris J. Mitchell, Hans-Joachim Hitz, Günther Horn, A. Poliakova, P. Howard: Secure Billing for Mobile Information Services in UMTS. IS&N 1998: 535-548
38 Chris J. Mitchell: On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes. IEEE Transactions on Information Theory 44(7): 3146-3150 (1998)
37 Chris J. Mitchell, Chan Yeob Yeun: Fixing a Problem in the Helsinki Protocol. Operating Systems Review 32(4): 21-24 (1998)
36EEChris J. Mitchell, Kenneth G. Paterson: Perfect Factors from Cyclic Codes and Interleaving. SIAM J. Discrete Math. 11(2): 241-264 (1998)
1997
35 Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193
34 Liqun Chen, Chris J. Mitchell: An anonymous and undeniable payment scheme. ICICS 1997: 478-482
33EEMark P. Hoyle, Chris J. Mitchell: On Solutions to the Key Escrow Problem. State of the Art in Applied Cryptography 1997: 277-306
32 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Authentication Using Minimally Trusted Servers. Operating Systems Review 31(3): 16-28 (1997)
31EEChris J. Mitchell: De Bruijn Sequences and Perfect Factors. SIAM J. Discrete Math. 10(2): 270-281 (1997)
1996
30 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133
29 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153
28 Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild: Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. Des. Codes Cryptography 7(1-2): 101-110 (1996)
27 Dieter Gollmann, Yongfei Han, Chris J. Mitchell: Redundant Integer Representations and Fast Exponentiation. Des. Codes Cryptography 7(1-2): 135-151 (1996)
26 Chris J. Mitchell, Tuvi Etzion, Kenneth G. Paterson: A method for constructing decodable de Bruijn sequences. IEEE Transactions on Information Theory 42(5): 1472-1478 (1996)
25EEGlenn Hurlbert, Chris J. Mitchell, Kenneth G. Paterson: On the Existence of de Bruijn Tori with Two by Two Windows. J. Comb. Theory, Ser. A 76(2): 213-230 (1996)
24 Chris J. Mitchell, Liqun Chen: Comments on the S/KEY User Authentication Scheme. Operating Systems Review 30(4): 12-16 (1996)
1995
23EELiqun Chen, Dieter Gollmann, Chris J. Mitchell: Key distribution without individual trusted authentification servers. CSFW 1995: 30-
22 Nigel Jefferies, Chris J. Mitchell, Michael Walker: A Proposed Architecture for Trusted Third Party Services. Cryptography: Policy and Algorithms 1995: 98-104
21 Yongfei Han, Dieter Gollmann, Chris J. Mitchell: Minimal Weight k-SR Representations. IMA Conf. 1995: 34-43
20 Chris J. Mitchell: A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels. IMA Conf. 1995: 84-93
19 Chris J. Mitchell: Aperiodic and semi-periodic perfect maps. IEEE Transactions on Information Theory 41(1): 88-95 (1995)
18 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Distributing Trust Amongst Multiple Authentication Servers. Journal of Computer Security 3(4): 255-268 (1995)
1994
17 Chris J. Mitchell, Kenneth G. Paterson: Decoding Perfect Maps. Des. Codes Cryptography 4(1): 11-30 (1994)
16 Chris J. Mitchell: Constructing c-ary Perfect Factors. Des. Codes Cryptography 4(4): 341-368 (1994)
15EEJonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild: Perfect binary arrays and difference sets. Discrete Mathematics 125(1-3): 241-254 (1994)
14 John Burns, Chris J. Mitchell: Parameter Selection for Server-Aided RSA Computation Schemes. IEEE Trans. Computers 43(2): 163-174 (1994)
13EEChris J. Mitchell, Michael Walker, Peter R. Wild: The Combinatorics of Perfect Authentication Schemes. SIAM J. Discrete Math. 7(1): 102-107 (1994)
1993
12 Chris J. Mitchell, A. Thomas: Standardising Authentication Protocols Based on Public-Key Techniques. Journal of Computer Security 2: 23-36 (1993)
1992
11 Chris J. Mitchell: Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure. IEEE Trans. Computers 41(4): 505-507 (1992)
1991
10EEChris J. Mitchell, Vijay Varadharajan: Modified forms of cipher block chaining. Computers & Security 10(1): 37-40 (1991)
1990
9 Chris J. Mitchell, Dave Rush, Michael Walker: A Secure Messaging Architecture Implementing the X.400-1988 Security Features. Comput. J. 33(4): 290-295 (1990)
8EEJohn Burns, Chris J. Mitchell: A security scheme for resource sharing over a network. Computers & Security 9(1): 67-75 (1990)
7 Chris J. Mitchell: Enumerating Boolean Functions of Cryptographic Significance. J. Cryptology 2(3): 155-170 (1990)
6 Philippe Godlewski, Chris J. Mitchell: Key-Minimal Crytosystems for Unconditional Secrecy. J. Cryptology 3(1): 1-25 (1990)
1989
5EEPhilippe Godlewski, Chris J. Mitchell: Key Minimal Authentication Systems for Unconditional Secrecy. EUROCRYPT 1989: 497-501
4 Chris J. Mitchell: Multi-Destination Secure Electronic Mail. Comput. J. 32(1): 13-15 (1989)
3 Chris J. Mitchell: Another Postage Stamp Problem. Comput. J. 32(4): 374-376 (1989)
2EEChris J. Mitchell, Dave Rush, Michael Walker: A remark on hash functions for message authentication. Computers & Security 8(1): 55-58 (1989)
1988
1EEChris J. Mitchell, Fred Piper: Key storage in secure networks. Discrete Applied Mathematics 21(3): 215-228 (1988)

Coauthor Index

1Imad M. Abbadi [97]
2Mansour A. Al-Meaither [66]
3Sattam S. Al-Riyami [57]
4Waleed A. Alrodhan [98] [103]
5Adil Alsaid [76] [86]
6Suranjith Ariyapperuma [100]
7Côme Berbain [84]
8Niklas Borselius [44] [47] [50] [51] [62]
9Karl Brincat [45] [49]
10John Burns [8] [14]
11Liqun Chen [18] [23] [24] [29] [30] [32] [34] [35] [102] [105]
12Gary Clemo [77]
13Don Coppersmith [42]
14Nicolas Courtois [84]
15Blandine Debraize [84]
16Tuvi Etzion [26]
17Anand S. Gajparia [74]
18Eimear Gallery [99]
19Philippe Godlewski [5] [6]
20Dieter Gollmann [18] [21] [23] [27] [29] [30] [32] [35] [40]
21Li Gong [40]
22Aline Gouget [84]
23Yongfei Han [21] [27]
24Hans-Joachim Hitz [39]
25Günther Horn [39]
26P. Howard [39]
27Mark P. Hoyle [33]
28Shenglan Hu [79]
29Namhyun Hur [58]
30Glenn H. Hurlbert (Glenn Hurlbert) [25]
31Pita Jarupunphol [53] [55]
32Jonathan Jedwab [15]
33Nigel Jefferies [22]
34Georgios Kalogridis [77] [104]
35Günter Karjoth [40]
36Vorapranee Khu-smith [48] [52] [56] [65]
37Lars R. Knudsen [42] [43] [60] [73]
38Adrian Leung [93] [95] [102]
39John A. MacDonald [78]
40Andrew Martin [105]
41Keith M. Martin [39]
42Sharon Nachtigal [92]
43Paulo S. Pagliusi [54] [61]
44Andreas Pashalidis [63] [68] [69] [71] [72]
45Kenneth G. Paterson [17] [25] [26] [36] [83]
46Fred Piper [1] [15] [28] [94]
47A. Poliakova [39]
48Bart Preneel [39]
49Geraint Price [85]
50Konstantinos Rantos [46] [75]
51Luciano Rila [59] [67]
52Dave Rush [2] [9]
53Peter Y. A. Ryan (Peter Ryan) [40]
54Hervé Sibert [84]
55William G. Sirett [78]
56Boyeon Song [101]
57Qiang Tang [82] [87] [88] [91]
58A. Thomas [12]
59Vijay Varadharajan [10]
60Michael Walker [2] [9] [13] [22] [28]
61Peter R. Wild [13] [15] [28] [35] [94]
62Aaron Wilson [44] [47] [50] [51]
63Arnold K. L. Yau [83]
64Chan Yeob Yeun [37] [74]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)