Professor Chris Mitchell

  1. Published

    Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Li, W., Mitchell, C. J. & Chen, T., 22 Dec 2018, Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers. Matyáš, V., Švenda, P., Stajano, F., Christianson, B. & Anderson, J. (eds.). Springer, p. 24-41 18 p. (Lecture Notes in Computer Science; vol. 11286).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published
  3. Published

    Who needs trust for 5G?

    Mitchell, C. J., 2 May 2020, arXiv.

    Research output: Working paper

  4. Published

    What is trusted computing?

    Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 2019, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Using trusted computing to secure mobile ubiquitous environments

    Leung, A., Yau, P-W. & Mitchell, C., 2009, Security and Privacy in Mobile & Wireless Networking. Gritzalis, S., Karaygiannis, T. & Skianis, C. (eds.). Leicester, UK: Troubador, p. 303-335 33 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  16. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    User's guide to cryptography and standards

    Dent, A. W. & Mitchell, C. J., 2005, Artech House.

    Research output: Book/ReportBook

  18. Forthcoming

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 9 Apr 2020, (Accepted/In press) Proceedings of SecWeb 2020, 11 September 2020. IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Ubiquitous one-time password service using the Generic Authentication Architecture

    Chen, C., Mitchell, C. J. & Tang, S., 2013, In : Mobile Networks and Applications. 18, 5, p. 738-747 10 p.

    Research output: Contribution to journalArticle

  21. Published

    Ubiquitous one-time password service using generic authentication architecture

    Chen, C., Mitchell, C. J. & Tang, S., Nov 2010. 8 p.

    Research output: Contribution to conferencePaper

  22. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Trusted Systems: 4th International Conference, InTrust 2012, London, UK, December 17-18, 2012, Proceedings

    Mitchell, C. J. (ed.) & Tomlinson, A. (ed.), 12 Dec 2012, Springer-Verlag. 117 p. (Lecture Notes in Computer Science; no. 7711)

    Research output: Book/ReportAnthology

  24. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Trusted computing: Security and applications

    Gallery, E. M. & Mitchell, C. J., 2009, In : Cryptologia. 33, p. 217-245 29 p.

    Research output: Contribution to journalArticle

  26. Published

    Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings

    Chen, L. (ed.), Mitchell, C. J. (ed.) & Martin, A. (ed.), 2009, Springer-Verlag. 263 p. (Lecture Notes in Computer Science; vol. 5471)

    Research output: Book/ReportAnthology

  27. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Trusted Computing

    Mitchell, C. J. (ed.), 2005, IEE Press. 313 p.

    Research output: Book/ReportAnthology

  29. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Truncation attacks on MACs

    Mitchell, C. J., Jun 2003, In : Electronics Letters. 39, 20, p. 1439-1440 2 p.

    Research output: Contribution to journalArticle

  31. Published

    Trialling Secure Billing with Trusted Third Party Support for UMTS Applications

    Horn, G., Howard, P., Martin, K. M., Mitchell, C. J., Preneel, B. & Rantos, K., 1998, Proceedings of 3rd ACTS Mobile Communications Summit, Rhodes, Greece, 9-11 June 1998. p. 574-579 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  32. Published

    Trashing IMSI catchers in mobile networks

    Khan, M. & Mitchell, C. J., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, July 18-20, 2017: WiSec '17 . Association for Computing Machinery (ACM), p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Too little too late: Can we control browser fingerprinting?

    Al-Fannah, N. M. & Mitchell, C., 7 Jan 2020, In : Journal of Intellectual Capital. 21, 2, p. 165-180 16 p.

    Research output: Contribution to journalArticle

  34. Published

    The use of Trusted Third Parties and Secure Billing in UMTS

    Chen, LI., Hitz, H-J., Horn, G., Howker, K., Kessler, V., Knudsen, L. R., Mitchell, C. J. & Radu, C., 1996, Proceedings of the ACTS Mobile Communications Summit, Granada, Spain, 27-29 November 1996. Vol. 2. p. 493-499 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    The security issue

    Mitchell, C. J., 1989, Proceedings of Value Added Network Services for Europe, London, September 1989. London: IBC Technical Services Ltd, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    The security architecture of the secure mobile messaging demonstrator

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1988, Proceedings of UK IT 88. IED, Swansea, p. 171-174 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published
  38. Published

    The Royal Holloway TTP-based key escrow scheme

    Mitchell, C. J., 1996, In : Information Security Technical Report. 1, 1, p. 63-69 7 p.

    Research output: Contribution to journalArticle

  39. Published

    The personal PKI

    Mitchell, C. J. & Schaffelhofer, R., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 35-61 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  40. Published

    The personal CA - PKI for a Personal Area Network

    Gehrmann, C., Nyberg, K. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 31-35 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    The Location Information Preference Authority: Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2004, Nordsec 2004, The 9th Nordic Workshop on Secure IT-systems, Helsinki University of Technology, Finland, November 2004. Liimatainen, S. & Virtanen, T. (eds.). p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., Jun 2020, In : Computers and Security. 93, p. 1-11 11 p., 101825.

    Research output: Contribution to journalArticle

  43. Published
  44. Published

    The future of SET

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 9-17 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    The cost of reducing key-storage requirements in secure networks

    Mitchell, C. J. & Piper, F. C., 1987, In : Computers and Security. 6, 4, p. 339-341 3 p.

    Research output: Contribution to journalArticle

  46. Published

    The combinatorics of perfect authentication schemes

    Mitchell, C. J., Walker, M. & Wild, P. R., 1994, In : SIAM Journal on Discrete Mathematics. 7, 1, p. 102-107 6 p.

    Research output: Contribution to journalArticle

  47. Published

    Tailoring authentication protocols to match underlying mechanisms

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1996, Information Security and Privacy - Proceedings: First Australasian Conference, Wollongong, NSW, Australia, June 1996. Pieprzyk, J. & Seberry, J. (eds.). Springer-Verlag, p. 121-133 13 p. (Lecture Notes in Computer Science; no. 1172).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Tactical decompositions of designs

    Beker, H. J., Mitchell, C. J. & Piper, F. C., 1982, In : Aequationes Mathematicae. 25, p. 123-152 30 p.

    Research output: Contribution to journalArticle

  49. Published

    Switching networks for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1988, In : Ars Combinatoria. 25A, p. 89-94 6 p.

    Research output: Contribution to journalArticle

  50. Published

    Switch reduction for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1987, In : Electronics Letters. 23, p. 346-347 2 p.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 Next