Professor Chris Mitchell

  1. Published

    Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings

    Qing, S. (ed.), Mitchell, C. J. (ed.), Chen, L. (ed.) & Liu, D. (ed.), 8 May 2018, Cham, Switzerland: Springer-Verlag. 689 p. (Lecture Notes in Computer Science; vol. 10631)

    Research output: Book/ReportBook

  2. Published

    Information and Communications Security: 11th International Conference, ICICS 2009, Beijing, China, December 2009, Proceedings

    Qing, S. (ed.), Mitchell, C. J. (ed.) & Wang, G. (ed.), 2009, Springer-Verlag. 504 p. (Lecture Notes in Computer Science; vol. 5927)

    Research output: Book/ReportAnthology

  3. Published

    Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings

    Markowitch, A. (ed.), Bilas, A. (ed.), Hoepman, J-H. (ed.), Mitchell, C. J. (ed.) & Quisquater, J-J. (ed.), 2009, Springer-Verlag. 167 p. (Lecture Notes in Computer Science; vol. 5746)

    Research output: Book/ReportAnthology

  4. Published

    Information Security, 18th International Conference, ISC 2015. Trondheim, Norway, September 9-11, 2015. Proceedings.

    Lopez, J. (ed.) & Mitchell, C. J. (ed.), 2015, Springer-Verlag. 570 p. (Lecture Notes in Computer Science; vol. 9290)

    Research output: Book/ReportAnthology

  5. Published

    Installing fake root keys in a PC

    Alsaid, A. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, Vol. 3545. p. 227-239 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Interoperation Between a Conventional PKI and an ID-Based Infrastructure

    Price, G. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, p. 73-85 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Is entity authentication necessary?

    Mitchell, C. J. & Pagliusi, P., 2004, Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19 2002, Revised Papers. Springer-Verlag, Vol. 2004. p. 20-33 14 p. (Lecture Notes in Computer Science; vol. 2845).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Is security a lost cause?

    Mitchell, C. J., May 2010. 8 p.

    Research output: Contribution to conferencePaper

  9. Published

    Key control in key agreement protocols

    Mitchell, C. J., Ward, M. & Wilson, P., 1998, In : Electronics Letters. 34, p. 980-981 2 p.

    Research output: Contribution to journalArticle

  10. Published

    Key distribution without individual trusted authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, Proceedings: The 8th IEEE Computer Security Foundations Workshop, Kenmare, Co. Kerry, Ireland, June 1995. IEEE Computer Society Press, p. 30-36 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Key escrow in multiple domains

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of INFOSEC'COM '97, Paris, June 1997. p. 101-116 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Key escrow in mutually mistrusting domains

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1997, Security Protocols - Proceedings, International Workshop, Cambridge, April 1996. Lomas, M. (ed.). Springer-Verlag, p. 139-153 15 p. (Lecture Notes in Computer Science; no. 1189).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Key minimal authentication systems for unconditional secrecy

    Godlewski, P. & Mitchell, C. J., 1990, Advances in Cryptology - Eurocrypt '89. Quisquater, J-J. & Vandewalle, J. (eds.). Springer-Verlag, p. 497-501 5 p. (Lecture Notes in Computer Science; no. 434).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Key recovery and forgery attacks on the MacDES MAC algorithm

    Coppersmith, D., Knudsen, L. R. & Mitchell, C. J., 2000, Advances in Cryptology - Proceedings of Crypto 2000. Bellare, M. (ed.). Springer-Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science; no. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Key recovery attack on ANSI retail MAC

    Mitchell, C. J., Feb 2003, In : Electronics Letters. 39, 4, p. 361-362

    Research output: Contribution to journalArticle

  16. Published

    Key recovery attacks on MACs based on properties of cryptographic APIs

    Brincat, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 63-72 10 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Key recovery for archived data using smart cards

    Rantos, K. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 75-85 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Key recovery in ASPeCT authentication and initialisation of payment protocol

    Rantos, K. & Mitchell, C. J., 1999, Proceedings of the 4th ACTS Mobile Communications Summit, Sorrento, Italy, June 1999. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Key recovery scheme interoperability - a protocol for mechanism negotiation

    Rantos, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Key storage in secure networks

    Mitchell, C. J. & Piper, F. C., 1988, In : Discrete Applied Mathematics. 21, 3, p. 215-228 14 p.

    Research output: Contribution to journalArticle

  21. Published

    Key-minimal cryptosystems for unconditional secrecy

    Mitchell, C. J. & Godlewski, P., 1990, In : Journal of Cryptology. 3, 1, p. 1-25 25 p.

    Research output: Contribution to journalArticle

  22. Published

    Limitations of challenge-response entity authentication

    Mitchell, C. J., Aug 1989, In : Electronics Letters. 25, 17, p. 1195-1196 2 p.

    Research output: Contribution to journalArticle

  23. Published

    Limits to anonymity when using credentials

    Pashalidis, A. & Mitchell, C. J., 2006, Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004, Revised Selected Papers. Springer-Verlag, Vol. 3957. p. 4-12 9 p. (Lecture Notes in Computer Science; vol. 3957).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Making serial number based authentication robust against loss of state

    Mitchell, C. J., Jul 2000, In : Operating Systems Review. 34, 3, p. 56-59 4 p.

    Research output: Contribution to journalArticle

  25. Published

    Malicious attacks on ad hoc network routing protocols

    Yau, P-W., Hu, S. & Mitchell, C. J., 2007, In : International Journal of Computer Research. 15, 1, p. 73-100 38 p.

    Research output: Contribution to journalArticle

Previous 12 3 4 5 6 7 8 9 ...12 Next