2009 |
105 | EE | Liqun Chen,
Chris J. Mitchell,
Andrew Martin:
Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings
Springer 2009 |
2008 |
104 | EE | Georgios Kalogridis,
Chris J. Mitchell:
Using Non-adaptive Group Testing to Construct Spy Agent Routes.
ARES 2008: 1013-1019 |
103 | EE | Waleed A. Alrodhan,
Chris J. Mitchell:
A client-side CardSpace-Liberty integration architecture.
IDtrust 2008: 1-7 |
102 | EE | Adrian Leung,
Liqun Chen,
Chris J. Mitchell:
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA).
TRUST 2008: 179-190 |
101 | EE | Boyeon Song,
Chris J. Mitchell:
RFID authentication protocol for low-cost tags.
WISEC 2008: 140-147 |
2007 |
100 | EE | Suranjith Ariyapperuma,
Chris J. Mitchell:
Security vulnerabilities in DNS and DNSSEC.
ARES 2007: 335-342 |
99 | EE | Eimear Gallery,
Chris J. Mitchell:
Trusted Mobile Platforms.
FOSAD 2007: 282-323 |
98 | EE | Waleed A. Alrodhan,
Chris J. Mitchell:
Addressing privacy issues in CardSpace.
IAS 2007: 285-291 |
97 | EE | Imad M. Abbadi,
Chris J. Mitchell:
Digital rights management using a mobile phone.
ICEC 2007: 185-194 |
96 | EE | Chris J. Mitchell:
Cryptanalysis of the EPBC Authenticated Encryption Mode.
IMA Int. Conf. 2007: 118-128 |
95 | EE | Adrian Leung,
Chris J. Mitchell:
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments.
Ubicomp 2007: 73-90 |
94 | EE | Chris J. Mitchell,
Fred Piper,
Peter R. Wild:
ID-based cryptography using symmetric primitives.
Des. Codes Cryptography 44(1-3): 249-262 (2007) |
2006 |
93 | | Adrian Leung,
Chris J. Mitchell:
A Service Discovery Threat Model for Ad Hoc Networks.
SECRYPT 2006: 167-174 |
92 | | Sharon Nachtigal,
Chris J. Mitchell:
Modelling E-Business Security Using Business Processes.
SECRYPT 2006: 459-464 |
91 | EE | Qiang Tang,
Chris J. Mitchell:
Cryptanalysis of a hybrid authentication protocol for large mobile networks.
Journal of Systems and Software 79(4): 496-501 (2006) |
90 | EE | Chris J. Mitchell:
Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen).
it - Information Technology 48(6): 321- (2006) |
2005 |
89 | EE | Chris J. Mitchell:
Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity.
ACISP 2005: 560-571 |
88 | EE | Qiang Tang,
Chris J. Mitchell:
On the Security of Some Password-Based Key Agreement Schemes.
CIS (2) 2005: 149-154 |
87 | EE | Qiang Tang,
Chris J. Mitchell:
Efficient Compilers for Authenticated Group Key Exchange.
CIS (2) 2005: 192-197 |
86 | EE | Adil Alsaid,
Chris J. Mitchell:
Installing Fake Root Keys in a PC.
EuroPKI 2005: 227-239 |
85 | EE | Geraint Price,
Chris J. Mitchell:
Interoperation Between a Conventional PKI and an ID-Based Infrastructure.
EuroPKI 2005: 73-85 |
84 | EE | Aline Gouget,
Hervé Sibert,
Côme Berbain,
Nicolas Courtois,
Blandine Debraize,
Chris J. Mitchell:
Analysis of the Bit-Search Generator and Sequence Compression Techniques.
FSE 2005: 196-214 |
83 | EE | Arnold K. L. Yau,
Kenneth G. Paterson,
Chris J. Mitchell:
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs.
FSE 2005: 299-319 |
82 | EE | Qiang Tang,
Chris J. Mitchell:
Security Properties of Two Authenticated Conference Key Agreement Protocols.
ICICS 2005: 304-314 |
81 | EE | Chris J. Mitchell:
Partial Key Recovery Attacks on XCBC, TMAC and OMAC.
IMA Int. Conf. 2005: 155-167 |
80 | EE | Chris J. Mitchell:
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?
ISC 2005: 244-258 |
79 | EE | Shenglan Hu,
Chris J. Mitchell:
Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling.
MSN 2005: 83-92 |
78 | | John A. MacDonald,
William G. Sirett,
Chris J. Mitchell:
Overcoming Channel Bandwidth Constraints in Secure SIM Applications.
SEC 2005: 539-550 |
77 | | Georgios Kalogridis,
Chris J. Mitchell,
Gary Clemo:
Spy Agents: Evaluating Trust in Remote Environments.
Security and Management 2005: 405-411 |
76 | | Adil Alsaid,
Chris J. Mitchell:
A Scanning Tool for PC Root Public Key Stores.
WEWoRC 2005: 45-52 |
75 | EE | Konstantinos Rantos,
Chris J. Mitchell:
Matching key recovery mechanisms to business requirements.
Computers & Security 24(3): 232-245 (2005) |
74 | EE | Anand S. Gajparia,
Chris J. Mitchell,
Chan Yeob Yeun:
Supporting User Privacy in Location Based Services.
IEICE Transactions 88-B(7): 2837-2847 (2005) |
73 | EE | Lars R. Knudsen,
Chris J. Mitchell:
Partial Key Recovery Attack Against RMAC.
J. Cryptology 18(4): 375-389 (2005) |
2004 |
72 | EE | Andreas Pashalidis,
Chris J. Mitchell:
Using EMV Cards for Single Sign-On.
EuroPKI 2004: 205-217 |
71 | | Andreas Pashalidis,
Chris J. Mitchell:
A Security Model for Anonymous Credential Systems.
International Information Security Workshops 2004: 183-198 |
70 | EE | Chris J. Mitchell:
Limits to Anonymity When Using Credentials (Transcript of Discussion).
Security Protocols Workshop 2004: 13-19 |
69 | EE | Andreas Pashalidis,
Chris J. Mitchell:
Limits to Anonymity When Using Credentials.
Security Protocols Workshop 2004: 4-12 |
2003 |
68 | EE | Andreas Pashalidis,
Chris J. Mitchell:
A Taxonomy of Single Sign-On Systems.
ACISP 2003: 249-264 |
67 | EE | Luciano Rila,
Chris J. Mitchell:
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards.
ACNS 2003: 254-264 |
66 | EE | Mansour A. Al-Meaither,
Chris J. Mitchell:
A Secure Electronic Payment Scheme for Charity Donations.
EC-Web 2003: 50-61 |
65 | EE | Vorapranee Khu-smith,
Chris J. Mitchell:
Enhancing E-commerce Security Using GSM Authentication.
EC-Web 2003: 72-83 |
64 | EE | Chris J. Mitchell:
Remote User Authentication Using Public Information.
IMA Int. Conf. 2003: 360-369 |
63 | EE | Andreas Pashalidis,
Chris J. Mitchell:
Single Sign-On Using Trusted Platforms.
ISC 2003: 54-68 |
62 | | Niklas Borselius,
Chris J. Mitchell:
Securing FIPA Agent Communication.
Security and Management 2003: 135-141 |
61 | EE | Paulo S. Pagliusi,
Chris J. Mitchell:
PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access.
WISA 2003: 135-149 |
60 | EE | Lars R. Knudsen,
Chris J. Mitchell:
Analysis of 3gpp-MAC and Two-key 3gpp-MAC.
Discrete Applied Mathematics 128(1): 181-191 (2003) |
2002 |
59 | EE | Luciano Rila,
Chris J. Mitchell:
Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication.
CARDIS 2002 |
58 | | Chris J. Mitchell,
Namhyun Hur:
On the security of a structural proven signer ordering multisignature scheme.
Communications and Multimedia Security 2002: 1-8 |
57 | | Sattam S. Al-Riyami,
Chris J. Mitchell:
Renewing crytographic timestamps.
Communications and Multimedia Security 2002: 9-16 |
56 | EE | Vorapranee Khu-smith,
Chris J. Mitchell:
Using EMV Cards to Protect E-commerce Transactions.
EC-Web 2002: 388-399 |
55 | | Pita Jarupunphol,
Chris J. Mitchell:
Implementation Aspects of SET/EMV.
I3E 2002: 305-315 |
54 | EE | Chris J. Mitchell,
Paulo S. Pagliusi:
Is Entity Authentication Necessary?
Security Protocols Workshop 2002: 20-33 |
53 | | Pita Jarupunphol,
Chris J. Mitchell:
E-commerce and the Media - Influences on Security Risk Perceptions.
WITASI 2002: 163-174 |
52 | EE | Vorapranee Khu-smith,
Chris J. Mitchell:
Using GSM to enhance e-commerce security.
Workshop Mobile Commerce 2002: 75-81 |
51 | EE | Niklas Borselius,
Chris J. Mitchell,
Aaron Wilson:
A pragmatic alternative to undetachable signatures.
Operating Systems Review 36(2): 6-11 (2002) |
50 | EE | Niklas Borselius,
Chris J. Mitchell,
Aaron Wilson:
On the value of threshold signatures.
Operating Systems Review 36(4): 30-35 (2002) |
2001 |
49 | EE | Karl Brincat,
Chris J. Mitchell:
New CBC-MAC Forgery Attacks.
ACISP 2001: 3-14 |
48 | EE | Vorapranee Khu-smith,
Chris J. Mitchell:
Enhancing the Security of Cookies.
ICISC 2001: 132-145 |
47 | EE | Niklas Borselius,
Chris J. Mitchell,
Aaron Wilson:
Undetachable Threshold Signatures.
IMA Int. Conf. 2001: 239-244 |
46 | EE | Konstantinos Rantos,
Chris J. Mitchell:
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation.
IMA Int. Conf. 2001: 268-276 |
45 | EE | Karl Brincat,
Chris J. Mitchell:
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs.
IMA Int. Conf. 2001: 63-72 |
44 | | Niklas Borselius,
Chris J. Mitchell,
Aaron Wilson:
On Mobile Agent Based Transactions in Moderately Hostile Environments.
Network Security 2001: 173-186 |
43 | EE | Lars R. Knudsen,
Chris J. Mitchell:
An analysis of the 3gpp-MAC scheme.
Electronic Notes in Discrete Mathematics 6: 346-355 (2001) |
2000 |
42 | EE | Don Coppersmith,
Lars R. Knudsen,
Chris J. Mitchell:
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm.
CRYPTO 2000: 184-196 |
41 | | Chris J. Mitchell:
Making serial number based authentication robust against loss of state.
Operating Systems Review 34(3): 56-59 (2000) |
1998 |
40 | EE | Peter Y. A. Ryan,
Dieter Gollmann,
Li Gong,
Günter Karjoth,
Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies.
CSFW 1998: 164-166 |
39 | EE | Keith M. Martin,
Bart Preneel,
Chris J. Mitchell,
Hans-Joachim Hitz,
Günther Horn,
A. Poliakova,
P. Howard:
Secure Billing for Mobile Information Services in UMTS.
IS&N 1998: 535-548 |
38 | | Chris J. Mitchell:
On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes.
IEEE Transactions on Information Theory 44(7): 3146-3150 (1998) |
37 | | Chris J. Mitchell,
Chan Yeob Yeun:
Fixing a Problem in the Helsinki Protocol.
Operating Systems Review 32(4): 21-24 (1998) |
36 | EE | Chris J. Mitchell,
Kenneth G. Paterson:
Perfect Factors from Cyclic Codes and Interleaving.
SIAM J. Discrete Math. 11(2): 241-264 (1998) |
1997 |
35 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell,
Peter R. Wild:
Secret Sharing with Reusable Polynomials.
ACISP 1997: 183-193 |
34 | | Liqun Chen,
Chris J. Mitchell:
An anonymous and undeniable payment scheme.
ICICS 1997: 478-482 |
33 | EE | Mark P. Hoyle,
Chris J. Mitchell:
On Solutions to the Key Escrow Problem.
State of the Art in Applied Cryptography 1997: 277-306 |
32 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Authentication Using Minimally Trusted Servers.
Operating Systems Review 31(3): 16-28 (1997) |
31 | EE | Chris J. Mitchell:
De Bruijn Sequences and Perfect Factors.
SIAM J. Discrete Math. 10(2): 270-281 (1997) |
1996 |
30 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Tailoring authentication protocols to match underlying mechanisms.
ACISP 1996: 121-133 |
29 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Key Escrow in Mutually Mistrusting Domains.
Security Protocols Workshop 1996: 139-153 |
28 | | Chris J. Mitchell,
Fred Piper,
Michael Walker,
Peter R. Wild:
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes.
Des. Codes Cryptography 7(1-2): 101-110 (1996) |
27 | | Dieter Gollmann,
Yongfei Han,
Chris J. Mitchell:
Redundant Integer Representations and Fast Exponentiation.
Des. Codes Cryptography 7(1-2): 135-151 (1996) |
26 | | Chris J. Mitchell,
Tuvi Etzion,
Kenneth G. Paterson:
A method for constructing decodable de Bruijn sequences.
IEEE Transactions on Information Theory 42(5): 1472-1478 (1996) |
25 | EE | Glenn Hurlbert,
Chris J. Mitchell,
Kenneth G. Paterson:
On the Existence of de Bruijn Tori with Two by Two Windows.
J. Comb. Theory, Ser. A 76(2): 213-230 (1996) |
24 | | Chris J. Mitchell,
Liqun Chen:
Comments on the S/KEY User Authentication Scheme.
Operating Systems Review 30(4): 12-16 (1996) |
1995 |
23 | EE | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Key distribution without individual trusted authentification servers.
CSFW 1995: 30- |
22 | | Nigel Jefferies,
Chris J. Mitchell,
Michael Walker:
A Proposed Architecture for Trusted Third Party Services.
Cryptography: Policy and Algorithms 1995: 98-104 |
21 | | Yongfei Han,
Dieter Gollmann,
Chris J. Mitchell:
Minimal Weight k-SR Representations.
IMA Conf. 1995: 34-43 |
20 | | Chris J. Mitchell:
A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels.
IMA Conf. 1995: 84-93 |
19 | | Chris J. Mitchell:
Aperiodic and semi-periodic perfect maps.
IEEE Transactions on Information Theory 41(1): 88-95 (1995) |
18 | | Liqun Chen,
Dieter Gollmann,
Chris J. Mitchell:
Distributing Trust Amongst Multiple Authentication Servers.
Journal of Computer Security 3(4): 255-268 (1995) |
1994 |
17 | | Chris J. Mitchell,
Kenneth G. Paterson:
Decoding Perfect Maps.
Des. Codes Cryptography 4(1): 11-30 (1994) |
16 | | Chris J. Mitchell:
Constructing c-ary Perfect Factors.
Des. Codes Cryptography 4(4): 341-368 (1994) |
15 | EE | Jonathan Jedwab,
Chris J. Mitchell,
Fred Piper,
Peter R. Wild:
Perfect binary arrays and difference sets.
Discrete Mathematics 125(1-3): 241-254 (1994) |
14 | | John Burns,
Chris J. Mitchell:
Parameter Selection for Server-Aided RSA Computation Schemes.
IEEE Trans. Computers 43(2): 163-174 (1994) |
13 | EE | Chris J. Mitchell,
Michael Walker,
Peter R. Wild:
The Combinatorics of Perfect Authentication Schemes.
SIAM J. Discrete Math. 7(1): 102-107 (1994) |
1993 |
12 | | Chris J. Mitchell,
A. Thomas:
Standardising Authentication Protocols Based on Public-Key Techniques.
Journal of Computer Security 2: 23-36 (1993) |
1992 |
11 | | Chris J. Mitchell:
Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure.
IEEE Trans. Computers 41(4): 505-507 (1992) |
1991 |
10 | EE | Chris J. Mitchell,
Vijay Varadharajan:
Modified forms of cipher block chaining.
Computers & Security 10(1): 37-40 (1991) |
1990 |
9 | | Chris J. Mitchell,
Dave Rush,
Michael Walker:
A Secure Messaging Architecture Implementing the X.400-1988 Security Features.
Comput. J. 33(4): 290-295 (1990) |
8 | EE | John Burns,
Chris J. Mitchell:
A security scheme for resource sharing over a network.
Computers & Security 9(1): 67-75 (1990) |
7 | | Chris J. Mitchell:
Enumerating Boolean Functions of Cryptographic Significance.
J. Cryptology 2(3): 155-170 (1990) |
6 | | Philippe Godlewski,
Chris J. Mitchell:
Key-Minimal Crytosystems for Unconditional Secrecy.
J. Cryptology 3(1): 1-25 (1990) |
1989 |
5 | EE | Philippe Godlewski,
Chris J. Mitchell:
Key Minimal Authentication Systems for Unconditional Secrecy.
EUROCRYPT 1989: 497-501 |
4 | | Chris J. Mitchell:
Multi-Destination Secure Electronic Mail.
Comput. J. 32(1): 13-15 (1989) |
3 | | Chris J. Mitchell:
Another Postage Stamp Problem.
Comput. J. 32(4): 374-376 (1989) |
2 | EE | Chris J. Mitchell,
Dave Rush,
Michael Walker:
A remark on hash functions for message authentication.
Computers & Security 8(1): 55-58 (1989) |
1988 |
1 | EE | Chris J. Mitchell,
Fred Piper:
Key storage in secure networks.
Discrete Applied Mathematics 21(3): 215-228 (1988) |