Professor Chris Mitchell

  1. Published

    Management of secure systems and security within Open Systems Interconnection (OSI)

    Mitchell, C. J., 1990, Proceedings of Information Security: Confidentiality, Integrity and Availability, London, July 1990. Uxbridge: UNICOM Seminars

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Management of secure systems and security within OSI

    Mitchell, C. J., 1993, Information Security. Ettinger, J. E. (ed.). Chapman & Hall, p. 47-60 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Management system requirements for wireless systems beyond 3G

    Lazaro, O., Irvine, J., Girma, D., Dunlop, J., Liotta, A., Borselius, N. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 240-244 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Manual authentication for wireless devices

    Gehrmann, C., Mitchell, C. J. & Nyberg, K., Apr 2004, In : Cryptobytes. 7, 1, p. 29-37

    Research output: Contribution to journalArticle

  5. Published

    Matching key recovery mechanisms to business requirements

    Rantos, K. & Mitchell, C. J., 2005, In : Computers and Security. 24, 3, p. 232-245 14 p.

    Research output: Contribution to journalArticle

  6. Published

    Mathematics of Dependable Systems: Proceedings of the first IMA Conference, Royal Holloway, September 1993

    Mitchell, C. J. (ed.) & Stavridou, V. (ed.), 1995, Oxford University Press. 295 p.

    Research output: Book/ReportAnthology

  7. Published

    Measuring 3-D Secure and 3D SET against e-commerce end-user requirements

    Jarupunphol, P. & Mitchell, C. J., 2003, Proceedings of the 8th Collaborative electronic commerce technology and research conference (CollECTeR (Europe) 2003), National University of Ireland, Galway, June 2003. p. 51-64 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Measuring SSL and SET against e-commerce consumer requirements

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - International Network Conference 2002 (INC 2002), University of Plymouth, UK, July 2002. p. 323-330 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Minimal weight k-SR representations

    Han, Y., Gollmann, D. & Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 34-43 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Minimum weight modified signed-digit representations and fast exponentiation

    Jedwab, J. & Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1171-1172 2 p.

    Research output: Contribution to journalArticle

  11. Published

    Mitigating CSRF attacks on OAuth 2.0 systems

    Li, W., Mitchell, C. J. & Chen, T. M., 1 Nov 2018, Proceedings of 2018 16th Annual Conference on Privacy, Security and Trust (PST): 28-30 Aug 2018. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Mobile security and trusted computing

    Mitchell, C. J., 2006, In : Information Technology. 48, p. 321-326

    Research output: Contribution to journalArticle

  13. Published

    Modelling e-business security using business processes

    Nachtigal, S. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 459-464 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Modified forms of cipher block chaining

    Mitchell, C. J. & Varadharajan, V., Feb 1991, In : Computers and Security. 10, 1, p. 37-40

    Research output: Contribution to journalArticle

  15. Published

    Multi-destination secure electronic mail

    Mitchell, C. J., 1989, In : The Computer Journal. 32, 1, p. 13-15 3 p.

    Research output: Contribution to journalArticle

  16. Published

    New c-ary perfect factors in the de Bruijn Graph

    Mitchell, C. J., 1995, Codes and Cyphers - Cryptography and Coding IV: Proceedings of the fourth IMA Cryptography and Coding Conference, Cirencester, December 1993. Southend: Formara Ltd., p. 299-313 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    New CBC-MAC forgery attacks

    Brincat, K. & Mitchell, C. J., 2001, Information Security and Privacy, ACISP 2001, Sydney, Australia, July 2001. Varadharajan, V. & Mu, Y. (eds.). Springer-Verlag, p. 3-14 12 p. (Lecture Notes in Computer Science; no. 2119).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Ninja: Non identity based, privacy preserving authentication for ubiquitous environments

    Leung, A. & Mitchell, C. J., 2007, UbiComp 2007: Ubiquitous Computing, 9th International Conference, Innsbruck, Austria, September 16-19 2007. Krumm, J., Abowd, G. D., Seneviratne, A. & Strang, T. (eds.). Springer-Verlag, Vol. 4717. p. 73-90 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T., 11 Nov 2019, Proceedings of the Security Standardisation Research Conference 2019 (SSR 2019, an ACM CCS 2019 Workshop), London, November 11 2019. ACM, p. 35-44 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    On a possible privacy flaw in Direct Anonymous Attestation (DAA)

    Leung, A., Chen, L. & Mitchell, C. J., 2008, Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, Villach, Austria, March 11-12, 2008, Proceedings. Lipp, P., Sadeghi, A-R. & K-M. K. (eds.). Berlin: Springer-Verlag, p. 179-190 12 p. (Lecture Notes in Computer Science; vol. 4968).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    On integer-valued rational polynomials and depth distributions of binary codes

    Mitchell, C. J., 1998, In : IEEE Transactions on Information Theory. 44, p. 3146-3150 5 p.

    Research output: Contribution to journalArticle

  22. Published

    On mobile agent based transactions in moderately hostile environments

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Advances in Network and Distributed Systems Security, Proceedings of IFIP TC11 WG11.4 First Annual Working Conference on Network Security, KU Leuven, Belgium, November 2001. De Decker, B., Piessens, F., Smits, J. & Van Herreweghen, E. (eds.). Kluwer Academic Publishers, p. 173-186 14 p. (IFIP Conference Proceedings; no. 206).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    On parameter selection for server-aided RSA computation schemes

    Burns, J. & Mitchell, C. J., 1994, In : IEEE Transactions on Computers. 43, 2, p. 163-174 12 p.

    Research output: Contribution to journalArticle

  24. Published

    On solutions to the key escrow problem

    Hoyle, M. P. & Mitchell, C. J., 1998, State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 1997. Preneel, B. & Rijmen, V. (eds.). Springer-Verlag, p. 277-306 30 p. (Lecture Notes in Computer Science; no. 1528).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    On the Existence of de Bruijn Tori with Two by Two Windows

    Hurlbert, G., Mitchell, C. J. & Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 76, p. 213-230 18 p.

    Research output: Contribution to journalArticle

Previous 1...3 4 5 6 7 8 9 10 ...12 Next