2009 | ||
---|---|---|
105 | EE | Liqun Chen, Chris J. Mitchell, Andrew Martin: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings Springer 2009 |
2008 | ||
104 | EE | Georgios Kalogridis, Chris J. Mitchell: Using Non-adaptive Group Testing to Construct Spy Agent Routes. ARES 2008: 1013-1019 |
103 | EE | Waleed A. Alrodhan, Chris J. Mitchell: A client-side CardSpace-Liberty integration architecture. IDtrust 2008: 1-7 |
102 | EE | Adrian Leung, Liqun Chen, Chris J. Mitchell: On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). TRUST 2008: 179-190 |
101 | EE | Boyeon Song, Chris J. Mitchell: RFID authentication protocol for low-cost tags. WISEC 2008: 140-147 |
2007 | ||
100 | EE | Suranjith Ariyapperuma, Chris J. Mitchell: Security vulnerabilities in DNS and DNSSEC. ARES 2007: 335-342 |
99 | EE | Eimear Gallery, Chris J. Mitchell: Trusted Mobile Platforms. FOSAD 2007: 282-323 |
98 | EE | Waleed A. Alrodhan, Chris J. Mitchell: Addressing privacy issues in CardSpace. IAS 2007: 285-291 |
97 | EE | Imad M. Abbadi, Chris J. Mitchell: Digital rights management using a mobile phone. ICEC 2007: 185-194 |
96 | EE | Chris J. Mitchell: Cryptanalysis of the EPBC Authenticated Encryption Mode. IMA Int. Conf. 2007: 118-128 |
95 | EE | Adrian Leung, Chris J. Mitchell: Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. Ubicomp 2007: 73-90 |
94 | EE | Chris J. Mitchell, Fred Piper, Peter R. Wild: ID-based cryptography using symmetric primitives. Des. Codes Cryptography 44(1-3): 249-262 (2007) |
2006 | ||
93 | Adrian Leung, Chris J. Mitchell: A Service Discovery Threat Model for Ad Hoc Networks. SECRYPT 2006: 167-174 | |
92 | Sharon Nachtigal, Chris J. Mitchell: Modelling E-Business Security Using Business Processes. SECRYPT 2006: 459-464 | |
91 | EE | Qiang Tang, Chris J. Mitchell: Cryptanalysis of a hybrid authentication protocol for large mobile networks. Journal of Systems and Software 79(4): 496-501 (2006) |
90 | EE | Chris J. Mitchell: Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen). it - Information Technology 48(6): 321- (2006) |
2005 | ||
89 | EE | Chris J. Mitchell: Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. ACISP 2005: 560-571 |
88 | EE | Qiang Tang, Chris J. Mitchell: On the Security of Some Password-Based Key Agreement Schemes. CIS (2) 2005: 149-154 |
87 | EE | Qiang Tang, Chris J. Mitchell: Efficient Compilers for Authenticated Group Key Exchange. CIS (2) 2005: 192-197 |
86 | EE | Adil Alsaid, Chris J. Mitchell: Installing Fake Root Keys in a PC. EuroPKI 2005: 227-239 |
85 | EE | Geraint Price, Chris J. Mitchell: Interoperation Between a Conventional PKI and an ID-Based Infrastructure. EuroPKI 2005: 73-85 |
84 | EE | Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, Chris J. Mitchell: Analysis of the Bit-Search Generator and Sequence Compression Techniques. FSE 2005: 196-214 |
83 | EE | Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell: Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. FSE 2005: 299-319 |
82 | EE | Qiang Tang, Chris J. Mitchell: Security Properties of Two Authenticated Conference Key Agreement Protocols. ICICS 2005: 304-314 |
81 | EE | Chris J. Mitchell: Partial Key Recovery Attacks on XCBC, TMAC and OMAC. IMA Int. Conf. 2005: 155-167 |
80 | EE | Chris J. Mitchell: Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? ISC 2005: 244-258 |
79 | EE | Shenglan Hu, Chris J. Mitchell: Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling. MSN 2005: 83-92 |
78 | John A. MacDonald, William G. Sirett, Chris J. Mitchell: Overcoming Channel Bandwidth Constraints in Secure SIM Applications. SEC 2005: 539-550 | |
77 | Georgios Kalogridis, Chris J. Mitchell, Gary Clemo: Spy Agents: Evaluating Trust in Remote Environments. Security and Management 2005: 405-411 | |
76 | Adil Alsaid, Chris J. Mitchell: A Scanning Tool for PC Root Public Key Stores. WEWoRC 2005: 45-52 | |
75 | EE | Konstantinos Rantos, Chris J. Mitchell: Matching key recovery mechanisms to business requirements. Computers & Security 24(3): 232-245 (2005) |
74 | EE | Anand S. Gajparia, Chris J. Mitchell, Chan Yeob Yeun: Supporting User Privacy in Location Based Services. IEICE Transactions 88-B(7): 2837-2847 (2005) |
73 | EE | Lars R. Knudsen, Chris J. Mitchell: Partial Key Recovery Attack Against RMAC. J. Cryptology 18(4): 375-389 (2005) |
2004 | ||
72 | EE | Andreas Pashalidis, Chris J. Mitchell: Using EMV Cards for Single Sign-On. EuroPKI 2004: 205-217 |
71 | Andreas Pashalidis, Chris J. Mitchell: A Security Model for Anonymous Credential Systems. International Information Security Workshops 2004: 183-198 | |
70 | EE | Chris J. Mitchell: Limits to Anonymity When Using Credentials (Transcript of Discussion). Security Protocols Workshop 2004: 13-19 |
69 | EE | Andreas Pashalidis, Chris J. Mitchell: Limits to Anonymity When Using Credentials. Security Protocols Workshop 2004: 4-12 |
2003 | ||
68 | EE | Andreas Pashalidis, Chris J. Mitchell: A Taxonomy of Single Sign-On Systems. ACISP 2003: 249-264 |
67 | EE | Luciano Rila, Chris J. Mitchell: Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. ACNS 2003: 254-264 |
66 | EE | Mansour A. Al-Meaither, Chris J. Mitchell: A Secure Electronic Payment Scheme for Charity Donations. EC-Web 2003: 50-61 |
65 | EE | Vorapranee Khu-smith, Chris J. Mitchell: Enhancing E-commerce Security Using GSM Authentication. EC-Web 2003: 72-83 |
64 | EE | Chris J. Mitchell: Remote User Authentication Using Public Information. IMA Int. Conf. 2003: 360-369 |
63 | EE | Andreas Pashalidis, Chris J. Mitchell: Single Sign-On Using Trusted Platforms. ISC 2003: 54-68 |
62 | Niklas Borselius, Chris J. Mitchell: Securing FIPA Agent Communication. Security and Management 2003: 135-141 | |
61 | EE | Paulo S. Pagliusi, Chris J. Mitchell: PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. WISA 2003: 135-149 |
60 | EE | Lars R. Knudsen, Chris J. Mitchell: Analysis of 3gpp-MAC and Two-key 3gpp-MAC. Discrete Applied Mathematics 128(1): 181-191 (2003) |
2002 | ||
59 | EE | Luciano Rila, Chris J. Mitchell: Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication. CARDIS 2002 |
58 | Chris J. Mitchell, Namhyun Hur: On the security of a structural proven signer ordering multisignature scheme. Communications and Multimedia Security 2002: 1-8 | |
57 | Sattam S. Al-Riyami, Chris J. Mitchell: Renewing crytographic timestamps. Communications and Multimedia Security 2002: 9-16 | |
56 | EE | Vorapranee Khu-smith, Chris J. Mitchell: Using EMV Cards to Protect E-commerce Transactions. EC-Web 2002: 388-399 |
55 | Pita Jarupunphol, Chris J. Mitchell: Implementation Aspects of SET/EMV. I3E 2002: 305-315 | |
54 | EE | Chris J. Mitchell, Paulo S. Pagliusi: Is Entity Authentication Necessary? Security Protocols Workshop 2002: 20-33 |
53 | Pita Jarupunphol, Chris J. Mitchell: E-commerce and the Media - Influences on Security Risk Perceptions. WITASI 2002: 163-174 | |
52 | EE | Vorapranee Khu-smith, Chris J. Mitchell: Using GSM to enhance e-commerce security. Workshop Mobile Commerce 2002: 75-81 |
51 | EE | Niklas Borselius, Chris J. Mitchell, Aaron Wilson: A pragmatic alternative to undetachable signatures. Operating Systems Review 36(2): 6-11 (2002) |
50 | EE | Niklas Borselius, Chris J. Mitchell, Aaron Wilson: On the value of threshold signatures. Operating Systems Review 36(4): 30-35 (2002) |
2001 | ||
49 | EE | Karl Brincat, Chris J. Mitchell: New CBC-MAC Forgery Attacks. ACISP 2001: 3-14 |
48 | EE | Vorapranee Khu-smith, Chris J. Mitchell: Enhancing the Security of Cookies. ICISC 2001: 132-145 |
47 | EE | Niklas Borselius, Chris J. Mitchell, Aaron Wilson: Undetachable Threshold Signatures. IMA Int. Conf. 2001: 239-244 |
46 | EE | Konstantinos Rantos, Chris J. Mitchell: Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. IMA Int. Conf. 2001: 268-276 |
45 | EE | Karl Brincat, Chris J. Mitchell: Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. IMA Int. Conf. 2001: 63-72 |
44 | Niklas Borselius, Chris J. Mitchell, Aaron Wilson: On Mobile Agent Based Transactions in Moderately Hostile Environments. Network Security 2001: 173-186 | |
43 | EE | Lars R. Knudsen, Chris J. Mitchell: An analysis of the 3gpp-MAC scheme. Electronic Notes in Discrete Mathematics 6: 346-355 (2001) |
2000 | ||
42 | EE | Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell: Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. CRYPTO 2000: 184-196 |
41 | Chris J. Mitchell: Making serial number based authentication robust against loss of state. Operating Systems Review 34(3): 56-59 (2000) | |
1998 | ||
40 | EE | Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166 |
39 | EE | Keith M. Martin, Bart Preneel, Chris J. Mitchell, Hans-Joachim Hitz, Günther Horn, A. Poliakova, P. Howard: Secure Billing for Mobile Information Services in UMTS. IS&N 1998: 535-548 |
38 | Chris J. Mitchell: On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes. IEEE Transactions on Information Theory 44(7): 3146-3150 (1998) | |
37 | Chris J. Mitchell, Chan Yeob Yeun: Fixing a Problem in the Helsinki Protocol. Operating Systems Review 32(4): 21-24 (1998) | |
36 | EE | Chris J. Mitchell, Kenneth G. Paterson: Perfect Factors from Cyclic Codes and Interleaving. SIAM J. Discrete Math. 11(2): 241-264 (1998) |
1997 | ||
35 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193 | |
34 | Liqun Chen, Chris J. Mitchell: An anonymous and undeniable payment scheme. ICICS 1997: 478-482 | |
33 | EE | Mark P. Hoyle, Chris J. Mitchell: On Solutions to the Key Escrow Problem. State of the Art in Applied Cryptography 1997: 277-306 |
32 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Authentication Using Minimally Trusted Servers. Operating Systems Review 31(3): 16-28 (1997) | |
31 | EE | Chris J. Mitchell: De Bruijn Sequences and Perfect Factors. SIAM J. Discrete Math. 10(2): 270-281 (1997) |
1996 | ||
30 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133 | |
29 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153 | |
28 | Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild: Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. Des. Codes Cryptography 7(1-2): 101-110 (1996) | |
27 | Dieter Gollmann, Yongfei Han, Chris J. Mitchell: Redundant Integer Representations and Fast Exponentiation. Des. Codes Cryptography 7(1-2): 135-151 (1996) | |
26 | Chris J. Mitchell, Tuvi Etzion, Kenneth G. Paterson: A method for constructing decodable de Bruijn sequences. IEEE Transactions on Information Theory 42(5): 1472-1478 (1996) | |
25 | EE | Glenn Hurlbert, Chris J. Mitchell, Kenneth G. Paterson: On the Existence of de Bruijn Tori with Two by Two Windows. J. Comb. Theory, Ser. A 76(2): 213-230 (1996) |
24 | Chris J. Mitchell, Liqun Chen: Comments on the S/KEY User Authentication Scheme. Operating Systems Review 30(4): 12-16 (1996) | |
1995 | ||
23 | EE | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key distribution without individual trusted authentification servers. CSFW 1995: 30- |
22 | Nigel Jefferies, Chris J. Mitchell, Michael Walker: A Proposed Architecture for Trusted Third Party Services. Cryptography: Policy and Algorithms 1995: 98-104 | |
21 | Yongfei Han, Dieter Gollmann, Chris J. Mitchell: Minimal Weight k-SR Representations. IMA Conf. 1995: 34-43 | |
20 | Chris J. Mitchell: A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels. IMA Conf. 1995: 84-93 | |
19 | Chris J. Mitchell: Aperiodic and semi-periodic perfect maps. IEEE Transactions on Information Theory 41(1): 88-95 (1995) | |
18 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Distributing Trust Amongst Multiple Authentication Servers. Journal of Computer Security 3(4): 255-268 (1995) | |
1994 | ||
17 | Chris J. Mitchell, Kenneth G. Paterson: Decoding Perfect Maps. Des. Codes Cryptography 4(1): 11-30 (1994) | |
16 | Chris J. Mitchell: Constructing c-ary Perfect Factors. Des. Codes Cryptography 4(4): 341-368 (1994) | |
15 | EE | Jonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild: Perfect binary arrays and difference sets. Discrete Mathematics 125(1-3): 241-254 (1994) |
14 | John Burns, Chris J. Mitchell: Parameter Selection for Server-Aided RSA Computation Schemes. IEEE Trans. Computers 43(2): 163-174 (1994) | |
13 | EE | Chris J. Mitchell, Michael Walker, Peter R. Wild: The Combinatorics of Perfect Authentication Schemes. SIAM J. Discrete Math. 7(1): 102-107 (1994) |
1993 | ||
12 | Chris J. Mitchell, A. Thomas: Standardising Authentication Protocols Based on Public-Key Techniques. Journal of Computer Security 2: 23-36 (1993) | |
1992 | ||
11 | Chris J. Mitchell: Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure. IEEE Trans. Computers 41(4): 505-507 (1992) | |
1991 | ||
10 | EE | Chris J. Mitchell, Vijay Varadharajan: Modified forms of cipher block chaining. Computers & Security 10(1): 37-40 (1991) |
1990 | ||
9 | Chris J. Mitchell, Dave Rush, Michael Walker: A Secure Messaging Architecture Implementing the X.400-1988 Security Features. Comput. J. 33(4): 290-295 (1990) | |
8 | EE | John Burns, Chris J. Mitchell: A security scheme for resource sharing over a network. Computers & Security 9(1): 67-75 (1990) |
7 | Chris J. Mitchell: Enumerating Boolean Functions of Cryptographic Significance. J. Cryptology 2(3): 155-170 (1990) | |
6 | Philippe Godlewski, Chris J. Mitchell: Key-Minimal Crytosystems for Unconditional Secrecy. J. Cryptology 3(1): 1-25 (1990) | |
1989 | ||
5 | EE | Philippe Godlewski, Chris J. Mitchell: Key Minimal Authentication Systems for Unconditional Secrecy. EUROCRYPT 1989: 497-501 |
4 | Chris J. Mitchell: Multi-Destination Secure Electronic Mail. Comput. J. 32(1): 13-15 (1989) | |
3 | Chris J. Mitchell: Another Postage Stamp Problem. Comput. J. 32(4): 374-376 (1989) | |
2 | EE | Chris J. Mitchell, Dave Rush, Michael Walker: A remark on hash functions for message authentication. Computers & Security 8(1): 55-58 (1989) |
1988 | ||
1 | EE | Chris J. Mitchell, Fred Piper: Key storage in secure networks. Discrete Applied Mathematics 21(3): 215-228 (1988) |