Professor Chris Mitchell

  1. 2005
  2. Published

    Enhancing user privacy using trusted computing

    Gajparia, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 239-250 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Mitchell, C. J., 2005, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings. Zhou, J., Lopez, J., R. H. D. & Bao, F. (eds.). Springer-Verlag, Vol. 3650. p. 244-258 15 p. (Lecture Notes in Computer Science; vol. 3650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Improving IP address autoconfiguration security in MANETs using trust modelling

    Hu, S. & Mitchell, C. J., 2005, Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings. Jia, X., Wu, J. & He, Y. (eds.). Springer-Verlag, Vol. 3794. p. 83-92 10 p. (Lecture Notes in Computer Science; vol. 3794).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Installing fake root keys in a PC

    Alsaid, A. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, Vol. 3545. p. 227-239 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Interoperation Between a Conventional PKI and an ID-Based Infrastructure

    Price, G. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, p. 73-85 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Matching key recovery mechanisms to business requirements

    Rantos, K. & Mitchell, C. J., 2005, In : Computers and Security. 24, 3, p. 232-245 14 p.

    Research output: Contribution to journalArticle

  8. Published

    On the security of some password-based key agreement schemes

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 149-154 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Overcoming channel bandwidth constraints in secure SIM applications

    Macdonald, J. A., Sirett, W. G. & Mitchell, C. J., 2005, Security and privacy in the age of ubiquitous computing: Proceedings of IFIP Working Groups 11.2/8.8 Small Systems Security/Smart Cards Working Conference at 20th IFIP International Information Security Conference (SEC 2005), Makuhari-Messe, Chiba, Japan, May 2005. Sasaki, R., Qing, S. & Okamoto, E. (eds.). Springer-Verlag, p. 539–-549

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Padding oracle attacks on CBC-mode encryption with random and secret IVs

    Yau, A. K. L., Paterson, K. G. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer, p. 299-319 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Partial key recovery attacks on XCBC, TMAC and OMAC

    Mitchell, C. J., 2005, Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings. Smart, N. (ed.). Springer-Verlag, Vol. 3796. p. 155-167 13 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Security properties of two authenticated conference key agreement protocols

    Tang, Q. & Mitchell, C. J., 2005, Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings. Qing, S., Mao, W., Lopez, J. & Wang, G. (eds.). Springer-Verlag, Vol. 3783. p. 304-314 11 p. (Lecture Notes in Computer Science; vol. 3783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Single sign-on using TCG-conformant platforms

    Pashalidis, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 175-193 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    Spy agents: Evaluating trust in remote environments

    Kalogridis, G., Mitchell, C. J. & Clemo, G., 2005, Proceedings of the 2005 International Conference on Security and Management (SAM '05), June 2005, Las Vegas, USA. Arabnia, H. R. (ed.). CSREA Press, p. 405-411 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2005, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-B, p. 2837-2847 11 p.

    Research output: Contribution to journalArticle

  16. Published

    Trusted Computing

    Mitchell, C. J. (ed.), 2005, IEE Press. 313 p.

    Research output: Book/ReportAnthology

  17. Published

    User's guide to cryptography and standards

    Dent, A. W. & Mitchell, C. J., 2005, Artech House.

    Research output: Book/ReportBook

  18. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    What is trusted computing?

    Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. 2004
  21. Published

    Manual authentication for wireless devices

    Gehrmann, C., Mitchell, C. J. & Nyberg, K., Apr 2004, In : Cryptobytes. 7, 1, p. 29-37

    Research output: Contribution to journalArticle

  22. Published

    2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2004, Proceedings: 5th World Wireless Congress (WWC 2004), San Francisco, USA, May 25-28, 2004. Delson Group, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A secure GSM-based Murabaha transaction

    Al-Meaither, M. & Mitchell, C. J., 2004, Proceedings of ICTTA 04, The 1st International Conference on Information & Communication Technologies from Theory to Applications, Damascus, Syria, April 2004. IEEE, p. 77-78 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A security model for anonymous credential systems

    Pashalidis, A. & Mitchell, C. J., 2004, Information Security Management, Education and Privacy, Proceedings of the 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems, I-NetSec'04. Deswarte, Y., Cuppens, F., Jajodia, S. & Wang, L. (eds.). Kluwer Academic Publishers, p. 183-189 (IFIP Conference Proceedings; vol. 148).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Comments on mutual authentication and key exchange protocols for low power wireless communications

    Ng, S-L. & Mitchell, C. J., 2004, In : IEEE Communications Letters. 8, 4, p. 262-263 2 p.

    Research output: Contribution to journalComment/debate

  26. Published

    Cryptography for mobile security

    Mitchell, C. J., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 3-10 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. Published

    Digitally signed documents - Ambiguities and solutions

    Alsaid, A. & Mitchell, C. J., 2004, Proceedings - International Network Conference 2004 (INC 2004), University of Plymouth, UK, July 2004. Plymouth University, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Heterogeneous Internet access via PANA/UMTS

    Pagliusi, P. S. & Mitchell, C. J., 2004, Proceedings of the 3rd International Conference on Information Security, Hardware/Software Codesign and Computer Networks - ISCOCO 2004, Rio De Janeiro, Brazil, October 2004. World Scientific, 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Impostor: A single sign-on system for use from untrusted devices

    Pashalidis, A. & Mitchell, C. J., 2004, Proceedings of IEEE Globecom 2004, Global Telecommunications Conference, Dallas, Texas, USA, November/December 2004. IEEE, Vol. 4. p. 2191-2195

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Is entity authentication necessary?

    Mitchell, C. J. & Pagliusi, P., 2004, Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19 2002, Revised Papers. Springer-Verlag, Vol. 2004. p. 20-33 14 p. (Lecture Notes in Computer Science; vol. 2845).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Security for Mobility

    Mitchell, C. J. (ed.), 2004, IEE Press. 440 p.

    Research output: Book/ReportAnthology

  32. Published

    The Location Information Preference Authority: Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2004, Nordsec 2004, The 9th Nordic Workshop on Secure IT-systems, Helsinki University of Technology, Finland, November 2004. Liimatainen, S. & Virtanen, T. (eds.). p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    The personal PKI

    Mitchell, C. J. & Schaffelhofer, R., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 35-61 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  34. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. 2003
  36. Published

    Truncation attacks on MACs

    Mitchell, C. J., Jun 2003, In : Electronics Letters. 39, 20, p. 1439-1440 2 p.

    Research output: Contribution to journalArticle

  37. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC

    Knudsen, L. R. & Mitchell, C. J., May 2003, In : Discrete Applied Mathematics. 128, 1, p. 181-191

    Research output: Contribution to journalArticle

  38. Published

    Key recovery attack on ANSI retail MAC

    Mitchell, C. J., Feb 2003, In : Electronics Letters. 39, 4, p. 361-362

    Research output: Contribution to journalArticle

  39. Published

    A secure electronic Murabaha transaction

    Al-Meaither, M. & Mitchell, C. J., 2003, Proceedings of eTransformation, 16th Bled eCommerce Conference, Bled, Slovenia, June 2003. p. 662-674

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    A secure electronic payment scheme for charity donations

    Al-Meaither, M. & Mitchell, C. J., 2003, E-Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, Vol. 2738. p. 50-61 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    A taxonomy of single sign-on systems

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security and Privacy - 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11 2003, Proceedings. Safavi-Naini, R. & Seberry, J. (eds.). Springer-Verlag, Vol. 2727. p. 249-264 16 p. (Lecture Notes in Computer Science; vol. 2727).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Enhancing e-commerce security using GSM authentication

    Khu-smith, V. & Mitchell, C. J., 2003, -Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, p. 72-83 12 p. (Lecture Notes in Computer Science; vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Extending EMV to support Murabaha transactions

    Al-Meaither, M. & Mitchell, C. J., 2003, NORDSEC 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems - Encouraging Cooperation, Gjøvik University College, Norway, October 2003. p. 95-108 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Improvement of modified authenticated key agreement protocol

    Hsu, C-L., Wu, T-S., Wu, T-C. & Mitchell, C. J., 2003, In : Applied Mathematics and Computation. 142, p. 305-308

    Research output: Contribution to journalArticle

  45. Published

    Measuring 3-D Secure and 3D SET against e-commerce end-user requirements

    Jarupunphol, P. & Mitchell, C. J., 2003, Proceedings of the 8th Collaborative electronic commerce technology and research conference (CollECTeR (Europe) 2003), National University of Ireland, Galway, June 2003. p. 51-64 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    PANA/GSM authentication for Internet access

    Pagliusi, P. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 146-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    PANA/IKEv2: An Internet authentication protocol for heterogeneous access

    Pagliusi, P. & Mitchell, C. J., 2003, Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. Springer-Verlag, Vol. 2908. p. 135-149 15 p. (Lecture Notes in Computer Science; vol. 2908).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    PKI implementation issues in B2B e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2003, EICAR Conference Best Paper Proceedings, Copenhagen, Denmark, May 2003. Gattiker, U. E. (ed.). 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Remote user authentication using public information

    Mitchell, C. J., 2003, Cryptography and Coding, 9th IMA International Conference on Cryptography and Coding, Cirencester, UK, December 2003, Proceedings. Paterson, K. (ed.). Springer-Verlag, p. 360-369 10 p. (Lecture Notes in Computer Science; vol. 2898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Reputation methods for routing security for mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 130-137 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Securing FIPA agent communication

    Borselius, N. & Mitchell, C. J., 2003, Proceedings of the 2003 International Conference on Security and Management (SAM '03), Las Vegas, Nevada, USA, June 2003. Arabnia, H. R. & Mun, Y. (eds.). CSREA Press, Vol. 1. p. 135-141 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Security protocols for biometrics-based cardholder authentication in smartcards

    Rila, L. & Mitchell, C. J., 2003, Applied Cryptography and Network Security - First International Conference, ACNS 2003 - Kunming, China, October 16-19 2003 - Proceedings. Zhou, J., Yung, M. & Han, Y. (eds.). Springer-Verlag, p. 254-264 11 p. (Lecture Notes in Computer Science; vol. 2846).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Security vulnerabilities in ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of ISCTA '03, 7th International Symposium on Communications Theory and Applications, Ambleside, UK, July 2003. p. 99-104 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Simple techniques for enhancing the robustness of DSR

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of the 3rd Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC '03), Stockholm, Sweden, May 2003. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Single sign-on using trusted platforms

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 2003, Proceedings. Springer-Verlag, Vol. 2851. p. 54-68 15 p. (Lecture Notes in Computer Science; vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. 2002
  59. Published

    On the value of threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A., Oct 2002, In : Operating Systems Review. 36, 4, p. 30-35 6 p.

    Research output: Contribution to journalArticle

  60. Published

    A pragmatic alternative to undetectable signatures

    Borselius, N., Mitchell, C. J. & Wilson, A., Apr 2002, In : Operating Systems Review. 36, 2, p. 6-11 6 p.

    Research output: Contribution to journalArticle

  61. Published

    A security architecture for agent-based mobile systems

    Borselius, N., Hur, N., Kaprynski, M. & Mitchell, C. J., 2002, Proceedings - 3G2002, Third International Conference on Mobile Communications Technologies, London, UK, May 2002. IEE Press, p. 312-318 7 p. (Conference Publication; vol. 489).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Authentication protocols for mobile environment value-added services

    Horn, G., Martin, K. M. & Mitchell, C. J., 2002, In : IEEE Transaction on Vehicular Technology. 51, 2, p. 383-392 10 p.

    Research output: Contribution to journalArticle

  63. Published

    Consumer risk perceptions in e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 308-315 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    E-commerce and the media - Influences on security risk perceptions

    Jarupunphol, P. & Mitchell, C. J., 2002, Internet Technologies, Applications and Societal Impact, The 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, WITASI '02, Wroclaw, Poland, October 2002. Cellary, W. & Iyengar, A. (eds.). Kluwer Academic Publishers, p. 163-173 11 p. (IFIP Conference Proceedings; no. 232).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Electronic transaction security: An analysis of the effectiveness of SSL and TLS

    Khu-smith, V. & Mitchell, C. J., 2002, Proceedings of the International Conference on Security and Management (SAM '02), Las Vegas, Nevada, USA, June 2002. CSREA Press, p. 425-429 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Failures of SET implementation - What is amiss?

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - APDSI 2002, 7th Asia-Pacific Decision Sciences Institute Conference, Bangkok, Thailand, July 2002. 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Implementation aspects of SET/EMV

    Jarupunphol, P. & Mitchell, C. J., 2002, Towards the Knowledge Society: eCommerce, eBusiness and eGovernment, The 2nd IFIP Conference on e-commerce, e-business and e-government, IFIP I3E 2002, Lisbon, Portugal, October 2002. Monteiro, J. L., Swatman, P. M. C. & Tavares, L. V. (eds.). Kluwer Academic Publishers, p. 305-315 11 p. (IFIP Conference Proceedings; no. 233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Management system requirements for wireless systems beyond 3G

    Lazaro, O., Irvine, J., Girma, D., Dunlop, J., Liotta, A., Borselius, N. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 240-244 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Measuring SSL and SET against e-commerce consumer requirements

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - International Network Conference 2002 (INC 2002), University of Plymouth, UK, July 2002. p. 323-330 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    On the security of a structural proven signer ordering multisignature scheme

    Mitchell, C. J. & Hur, N., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, Vol. 228. p. 1-8 8 p. (IFIP Conference Proceedings; no. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Renewing cryptographic timestamps

    Al-Riyami, S. S. & Mitchell, C. J., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, p. 9-16 8 p. (IFIP Conference Proceedings; vol. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Securing Personal Area Networks

    Garefalakis, T. & Mitchell, C. J., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, Vol. 3. p. 1257-1259 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Securing Reconfigurable Terminals - mechanisms and protocols

    Gultchev, S., Mitchell, C. J., Moessner, K. & Tafazolli, R., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, p. 804-808 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Security analysis of smartcard to card reader communications for biometric cardholder authentication

    Rila, L. & Mitchell, C. J., 2002, Proceedings of CARDIS '02, 5th Smart Card Research and Advanced Application Conference, San Jose, California, November 2002. USENIX, p. 19-28 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    The future of SET

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 9-17 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    The personal CA - PKI for a Personal Area Network

    Gehrmann, C., Nyberg, K. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 31-35 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. 2001
  80. Published

    A person-to-person Internet payment system

    Al-Meaither, M. & Mitchell, C. J., 2001, Proceedings NordSec 2001 - 6th Nordic Workshop on Secure IT Systems, Lyngby, Denmark, November 2001. p. 5-17 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Actual and perceived levels of risk in consumer e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2001, Proceedings - 2nd International We-B Conference 2001, Perth, Western Australia, November 2001. p. 207-216 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    An analysis of the 3gpp-MAC scheme

    Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Enhancing the security of cookies

    Khu-smith, V. & Mitchell, C. J., 2001, Information Security and Cryptology - ICISC 2001 - Proceedings of the 4th International Conference, Seoul, Korea, December 2001. Kim, K. (ed.). Springer-Verlag, p. 132-145 14 p. (Lecture Notes in Computer Science; no. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Key recovery attacks on MACs based on properties of cryptographic APIs

    Brincat, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 63-72 10 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Key recovery scheme interoperability - a protocol for mechanism negotiation

    Rantos, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    New CBC-MAC forgery attacks

    Brincat, K. & Mitchell, C. J., 2001, Information Security and Privacy, ACISP 2001, Sydney, Australia, July 2001. Varadharajan, V. & Mu, Y. (eds.). Springer-Verlag, p. 3-14 12 p. (Lecture Notes in Computer Science; no. 2119).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    On mobile agent based transactions in moderately hostile environments

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Advances in Network and Distributed Systems Security, Proceedings of IFIP TC11 WG11.4 First Annual Working Conference on Network Security, KU Leuven, Belgium, November 2001. De Decker, B., Piessens, F., Smits, J. & Van Herreweghen, E. (eds.). Kluwer Academic Publishers, p. 173-186 14 p. (IFIP Conference Proceedings; no. 206).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Securing access to mobile networks beyond 3G

    Gehrmann, C., Horn, G., Jefferies, N. & Mitchell, C. J., 2001, Proceedings of the IST Mobile Communications Summit 2001, Barcelona, Spain, September 2001. p. 844-849 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. 2000
  91. Published

    PKI standards

    Mitchell, C. J., Dec 2000, In : Information Security Technical Report. 5, 4, p. 17-32 16 p.

    Research output: Contribution to journalArticle

  92. Published

    Making serial number based authentication robust against loss of state

    Mitchell, C. J., Jul 2000, In : Operating Systems Review. 34, 3, p. 56-59 4 p.

    Research output: Contribution to journalArticle

  93. Published

    Certificate translation

    Borselius, N. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 289-300 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Comment: Horng's identification scheme based on Shamir's 'RSA for paranoids'

    Mitchell, C. J. & Ng, S-L., 2000, In : Electronics Letters. 36, 5, p. 422-422 1 p.

    Research output: Contribution to journalComment/debate

  95. Published

    Developments in security mechanism standards

    Mitchell, C. J., 2000, Internet and Intranet Security Management: Risks and Solutions. Janczewski, L. J. (ed.). Idea Group Publishing, p. 185-246 62 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  96. Published

    Key recovery and forgery attacks on the MacDES MAC algorithm

    Coppersmith, D., Knudsen, L. R. & Mitchell, C. J., 2000, Advances in Cryptology - Proceedings of Crypto 2000. Bellare, M. (ed.). Springer-Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science; no. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Key recovery for archived data using smart cards

    Rantos, K. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 75-85 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Security: a technical approach

    Piper, F. C. & Mitchell, C. J., 2000, E-commerce Handbook. Clapperton, G. (ed.). Gee Publishing, p. 9/11-9/20 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  99. 1999
  100. Published

    A fair certification protocol

    Mitchell, C. J. & Rantos, K., 1999, In : Computer Communication Review. 29, 3, p. 47-49 3 p.

    Research output: Contribution to journalArticle

  101. Published

    Attacks on MacDES MAC Algorithm

    Coppersmith, D. & Mitchell, C. J., 1999, In : Electronics Letters. 35, p. 1626-1627 2 p.

    Research output: Contribution to journalArticle

  102. Published

    Comment - Signature with message recovery

    Mitchell, C. J. & Yeun, C. Y., 1999, In : Electronics Letters. 35, p. 217 1 p.

    Research output: Contribution to journalArticle

  103. Published

    Comments on an optimized protocol for mobile network authentication and security

    Martin, K. M. & Mitchell, C. J., 1999, In : Mobile Computing and Communications Review. 3, 2, p. 37

    Research output: Contribution to journalArticle

  104. Published

    Key recovery in ASPeCT authentication and initialisation of payment protocol

    Rantos, K. & Mitchell, C. J., 1999, Proceedings of the 4th ACTS Mobile Communications Summit, Sorrento, Italy, June 1999. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. Published

    Remarks on KRA's key recovery block format

    Rantos, K. & Mitchell, C. J., 1999, In : Electronics Letters. 35, p. 632-634 3 p.

    Research output: Contribution to journalArticle

  106. Published

    Security in future mobile multimedia networks

    Mitchell, C. J. & Chen, LI., 1999, Insights into Mobile Multimedia Communications. Bull, D. R., Canagarajah, C. N. & Nix, A. R. (eds.). Academic Press, p. 177-190 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  107. 1998
  108. Published

    An online secret sharing scheme which identifies all cheaters

    Yeun, C. Y., Mitchell, C. J. & Burmester, M., 1998, Proceedings of NORDSEC '98, Trondheim, Norway, November 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution