Professor Chris Mitchell

  1. Article › Research › Peer-reviewed
  2. Published

    Comment on 'Blocking method for RSA cryptosystem without expanding cipher length'

    Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1527 1 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Comment on 'Existence of one-dimensional perfect binary arrays'

    Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 714

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Comments on a cryptographic key assignment scheme

    Tang, Q. & Mitchell, C. J., 2005, In: Computer Standards & Interfaces. 27, p. 323-326 4 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Comments on an optimized protocol for mobile network authentication and security

    Martin, K. M. & Mitchell, C. J., 1999, In: Mobile Computing and Communications Review. 3, 2, p. 37

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Comments on the S/KEY user authentication scheme

    Mitchell, C. J. & Chen, LI., Oct 1996, In: Operating Systems Review. 30, 4, p. 12-16 5 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Comments on two anonymous conference key distribution systems

    Tang, Q. & Mitchell, C. J., Oct 2005, In: Computer Standards & Interfaces. 27, 7, p. 397-400 4 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Constructing c-ary Perfect Factors

    Mitchell, C. J., 1994, In: Designs, Codes and Cryptography. 4, p. 341-368 28 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Constructing new perfect binary arrays

    Jedwab, J. & Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 650-652 3 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Cryptanalysis of a hybrid authentication protocol for large mobile networks

    Tang, Q. & Mitchell, C. J., Apr 2006, In: Journal of Systems and Software. 79, 4, p. 496-501 6 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Cryptanalysis of two identification schemes based on an ID-based cryptosystem

    Tang, Q. & Mitchell, C. J., Oct 2005, In: IEE Proceedings on Communications. 152, 5, p. 723-724 2 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    De Bruijn sequences and perfect factors

    Mitchell, C. J., 1997, In: SIAM Journal on Discrete Mathematics. 10, p. 270-281 12 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Decoding Perfect Maps

    Mitchell, C. J. & Paterson, K. G., 1994, In: Designs, Codes and Cryptography. 4, p. 11-30 20 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Distance-invariant error control codes from combinatorial designs

    Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1528-1529 2 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Distributing trust amongst multiple authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, In: Journal of Computer Security. 3, 4, p. 255-267 13 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Dynamic content attacks on digital signatures

    Alsaid, A. & Mitchell, C. J., 2005, In: Information and Computer Security . 13, 4, p. 328-336 9 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In: Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Enumerating Boolean functions of cryptographic significance

    Mitchell, C. J., 1990, In: Journal of Cryptology. 2, p. 155-170 16 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Fixing a problem in the Helsinki protocol

    Mitchell, C. J. & Yeun, C. Y., 1998, In: Operating Systems Review. 32, 4, p. 21-24 4 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Generating certification authority authenticated public keys in ad hoc networks

    Kounga, G., Mitchell, C. J. & Walter, T., 2012, In: Security and Communication Networks. 5, 1, p. 87-106 20 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Group divisible designs with dual properties

    Mitchell, C. J., 1984, In: Mitteilungen aus dem Mathematischen Seminar Giessen. 165, p. 105-117 13 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Mitchell, C. J., 23 Mar 2021, In: IET Information Security . 15, 3, p. 223-230 8 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    ID-based cryptography using symmetric primitives

    Mitchell, C. J., Piper, F. C. & Wild, P. R., 3 Jul 2007, In: Designs, Codes and Cryptography. 44, p. 249-262 14 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Improvement of modified authenticated key agreement protocol

    Hsu, C-L., Wu, T-S., Wu, T-C. & Mitchell, C. J., 2003, In: Applied Mathematics and Computation. 142, p. 305-308

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Improving the security of CardSpace

    Alrodhan, W. & Mitchell, C. J., 2009, In: EURASIP Journal on Information Security. 2009, 8 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Infinite families of quasiperfect and doubly quasiperfect binary arrays

    Jedwab, J. & Mitchell, C. J., 1990, In: Electronics Letters. 26, p. 294-295 2 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Key control in key agreement protocols

    Mitchell, C. J., Ward, M. & Wilson, P., 1998, In: Electronics Letters. 34, p. 980-981 2 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Key recovery attack on ANSI retail MAC

    Mitchell, C. J., Feb 2003, In: Electronics Letters. 39, 4, p. 361-362

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Key storage in secure networks

    Mitchell, C. J. & Piper, F. C., 1988, In: Discrete Applied Mathematics. 21, 3, p. 215-228 14 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Key-minimal cryptosystems for unconditional secrecy

    Mitchell, C. J. & Godlewski, P., 1990, In: Journal of Cryptology. 3, 1, p. 1-25 25 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Limitations of challenge-response entity authentication

    Mitchell, C. J., Aug 1989, In: Electronics Letters. 25, 17, p. 1195-1196 2 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Making serial number based authentication robust against loss of state

    Mitchell, C. J., Jul 2000, In: Operating Systems Review. 34, 3, p. 56-59 4 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Malicious attacks on ad hoc network routing protocols

    Yau, P-W., Hu, S. & Mitchell, C. J., 2007, In: International Journal of Computer Research. 15, 1, p. 73-100 38 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Manual authentication for wireless devices

    Gehrmann, C., Mitchell, C. J. & Nyberg, K., Apr 2004, In: Cryptobytes. 7, 1, p. 29-37

    Research output: Contribution to journalArticlepeer-review

  35. Published

    Matching key recovery mechanisms to business requirements

    Rantos, K. & Mitchell, C. J., 2005, In: Computers and Security. 24, 3, p. 232-245 14 p.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    Minimum weight modified signed-digit representations and fast exponentiation

    Jedwab, J. & Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1171-1172 2 p.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Mobile security and trusted computing

    Mitchell, C. J., 2006, In: Information Technology. 48, p. 321-326

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Modified forms of cipher block chaining

    Mitchell, C. J. & Varadharajan, V., Feb 1991, In: Computers and Security. 10, 1, p. 37-40

    Research output: Contribution to journalArticlepeer-review

  39. Published

    Multi-destination secure electronic mail

    Mitchell, C. J., 1989, In: The Computer Journal. 32, 1, p. 13-15 3 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    On integer-valued rational polynomials and depth distributions of binary codes

    Mitchell, C. J., 1998, In: IEEE Transactions on Information Theory. 44, p. 3146-3150 5 p.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    On parameter selection for server-aided RSA computation schemes

    Burns, J. & Mitchell, C. J., 1994, In: IEEE Transactions on Computers. 43, 2, p. 163-174 12 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    On the Existence of de Bruijn Tori with Two by Two Windows

    Hurlbert, G., Mitchell, C. J. & Paterson, K. G., 1996, In: Journal of Combinatorial Theory, Series A. 76, p. 213-230 18 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    On the Security of 2-Key Triple DES

    Mitchell, C. J., Nov 2016, In: IEEE Transactions on Information Theory. 62, 11, p. 6260-6267 8 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    On the value of threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A., Oct 2002, In: Operating Systems Review. 36, 4, p. 30-35 6 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    One-stage one-sided rearrangeable switching networks

    Mitchell, C. J. & Wild, P. R., Jan 1989, In: IEEE Transactions on Communications. 37, 1, p. 52-56 5 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Parsing ambiguities in authentication and key establishment protocols

    Chen, L. & Mitchell, C. J., 2010, In: International Journal of Electronic Security and Digital Forensics. 3, 1, p. 82-94 13 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Partial key recovery attack against RMAC

    Knudsen, L. R. & Mitchell, C. J., Feb 2005, In: Journal of Cryptology. 18, 4, p. 375-389 15 p.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Perfect binary arrays and difference sets

    Jedwab, J., Mitchell, C. J., Piper, F. C. & Wild, P., 1994, In: Discrete Mathematics. 125, p. 241-254 14 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Perfect Factors from Cyclic Codes and Interleaving

    Mitchell, C. J. & Paterson, K. G., 1998, In: SIAM Journal on Discrete Mathematics. 11, p. 241-264 24 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Permutations with restricted displacement

    Beker, H. J. & Mitchell, C. J., 1987, In: SIAM Journal on Algebraic and Discrete Methods. 8, p. 338-363 26 p.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    PKI standards

    Mitchell, C. J., Dec 2000, In: Information Security Technical Report. 5, 4, p. 17-32 16 p.

    Research output: Contribution to journalArticlepeer-review

  52. Published

    Redundant integer representations and fast exponentiation

    Gollmann, D., Han, Y. & Mitchell, C. J., 1996, In: Designs, Codes and Cryptography. 7, p. 135-151 17 p.

    Research output: Contribution to journalArticlepeer-review

  53. Published

    Remarks on KRA's key recovery block format

    Rantos, K. & Mitchell, C. J., 1999, In: Electronics Letters. 35, p. 632-634 3 p.

    Research output: Contribution to journalArticlepeer-review

  54. Published

    Scalable RFID security protocols supporting tag ownership transfer

    Song, B. & Mitchell, C. J., 2011, In: Computer Communications. 34, 4, p. 556-566 11 p.

    Research output: Contribution to journalArticlepeer-review

  55. Published

    Security defects in C.C.I.T.T. Recommendation X.509 - The directory authentication framework

    I'Anson, C. & Mitchell, C. J., Apr 1990, In: Computer Communication Review. 20, 2, p. 30-34 5 p.

    Research output: Contribution to journalArticlepeer-review

  56. Published

    Security issues in a group key establishment protocol

    Mitchell, C. J., Mar 2019, In: The Computer Journal. 62, 3, p. 373-376 4 p.

    Research output: Contribution to journalArticlepeer-review

  57. Published

    Solutions to the multidestination secure electronic mail problem

    Mitchell, C. J. & Walker, M., 1988, In: Computers and Security. 7, p. 483-488 6 p.

    Research output: Contribution to journalArticlepeer-review

  58. Published

    Standardising authentication protocols based on public key techniques

    Mitchell, C. J. & Thomas, A., 1993, In: Journal of Computer Security. 2, p. 23-36 14 p.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2005, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-B, p. 2837-2847 11 p.

    Research output: Contribution to journalArticlepeer-review

  60. Published

    Switch minimisation for a simple bidirectional network

    Mitchell, C. J. & Wild, P. R., 1988, In: Electronics Letters. 24, 20, p. 1284-1286 3 p.

    Research output: Contribution to journalArticlepeer-review

  61. Published

    Switch reduction for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1987, In: Electronics Letters. 23, p. 346-347 2 p.

    Research output: Contribution to journalArticlepeer-review

  62. Published

    Switching networks for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1988, In: Ars Combinatoria. 25A, p. 89-94 6 p.

    Research output: Contribution to journalArticlepeer-review

  63. Published

    Tactical decompositions of designs

    Beker, H. J., Mitchell, C. J. & Piper, F. C., 1982, In: Aequationes Mathematicae. 25, p. 123-152 30 p.

    Research output: Contribution to journalArticlepeer-review

  64. Published

    The combinatorics of perfect authentication schemes

    Mitchell, C. J., Walker, M. & Wild, P. R., 1994, In: SIAM Journal on Discrete Mathematics. 7, 1, p. 102-107 6 p.

    Research output: Contribution to journalArticlepeer-review

  65. Published

    The cost of reducing key-storage requirements in secure networks

    Mitchell, C. J. & Piper, F. C., 1987, In: Computers and Security. 6, 4, p. 339-341 3 p.

    Research output: Contribution to journalArticlepeer-review

  66. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., Jun 2020, In: Computers and Security. 93, p. 1-11 11 p., 101825.

    Research output: Contribution to journalArticlepeer-review

  67. Published

    The Royal Holloway TTP-based key escrow scheme

    Mitchell, C. J., 1996, In: Information Security Technical Report. 1, 1, p. 63-69 7 p.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    Too little too late: Can we control browser fingerprinting?

    Al-Fannah, N. M. & Mitchell, C., 7 Jan 2020, In: Journal of Intellectual Capital. 21, 2, p. 165-180 16 p.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    Truncation attacks on MACs

    Mitchell, C. J., Jun 2003, In: Electronics Letters. 39, 20, p. 1439-1440 2 p.

    Research output: Contribution to journalArticlepeer-review

  70. Published

    Trusted computing: Security and applications

    Gallery, E. M. & Mitchell, C. J., 2009, In: Cryptologia. 33, p. 217-245 29 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Ubiquitous one-time password service using the Generic Authentication Architecture

    Chen, C., Mitchell, C. J. & Tang, S., 2013, In: Mobile Networks and Applications. 18, 5, p. 738-747 10 p.

    Research output: Contribution to journalArticlepeer-review

  72. Published

    Yet another insecure group key distribution scheme using secret sharing

    Mitchell, C., Mar 2021, In: Journal of Information Security and Applications. 57, 4 p., 102713.

    Research output: Contribution to journalArticlepeer-review

  73. Other report › Research
  74. Unpublished

    CardSpace-OpenID Integration for CardSpace Users

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. (Technical Report Series; no. RHUL-MA-2011-12)

    Research output: Book/ReportOther report

  75. Unpublished

    Client-based CardSpace-Shibboleth Interoperation

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-13)

    Research output: Book/ReportOther report

  76. Unpublished

    Implementing PassCard, a CardSpace-based Password Manager

    Al-Sinani, H. & Mitchell, C., 20 Dec 2010, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2010-15)

    Research output: Book/ReportOther report

  77. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  78. Anthology › Research
  79. Published

    Applications of Combinatorial Mathematics: Proceedings of the IMA Conference, Oxford, December 1994

    Mitchell, C. J. (ed.), 1997, Oxford University Press. 241 p.

    Research output: Book/ReportAnthology

  80. Published
  81. Published

    Information and Communications Security: 11th International Conference, ICICS 2009, Beijing, China, December 2009, Proceedings

    Qing, S. (ed.), Mitchell, C. J. (ed.) & Wang, G. (ed.), 2009, Springer-Verlag. 504 p. (Lecture Notes in Computer Science; vol. 5927)

    Research output: Book/ReportAnthology

  82. Published

    Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings

    Markowitch, A. (ed.), Bilas, A. (ed.), Hoepman, J-H. (ed.), Mitchell, C. J. (ed.) & Quisquater, J-J. (ed.), 2009, Springer-Verlag. 167 p. (Lecture Notes in Computer Science; vol. 5746)

    Research output: Book/ReportAnthology

  83. Published

    Information Security, 18th International Conference, ISC 2015. Trondheim, Norway, September 9-11, 2015. Proceedings.

    Lopez, J. (ed.) & Mitchell, C. J. (ed.), 2015, Springer-Verlag. 570 p. (Lecture Notes in Computer Science; vol. 9290)

    Research output: Book/ReportAnthology

  84. Published

    Mathematics of Dependable Systems: Proceedings of the first IMA Conference, Royal Holloway, September 1993

    Mitchell, C. J. (ed.) & Stavridou, V. (ed.), 1995, Oxford University Press. 295 p.

    Research output: Book/ReportAnthology

  85. Published

    Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013. London, UK, April 8-9, 2013. Proceedings

    Fischer-Hübner, S. (ed.), de Leeuw, E. (ed.) & Mitchell, C. J. (ed.), 2013, Springer-Verlag. (IFIP Advances in Information and Communications Technology; no. 396)

    Research output: Book/ReportAnthology

  86. Published
  87. Published

    Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings

    Livraga, G. (ed.) & Mitchell, C. J. (ed.), Sep 2017, Berlin: Springer-Verlag. 235 p. (Lecture Notes in Computer Science; vol. 10547)

    Research output: Book/ReportAnthology

  88. Published

    Security for Mobility

    Mitchell, C. J. (ed.), 2004, IEE Press. 440 p.

    Research output: Book/ReportAnthology

  89. Published

    Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings

    Chen, LI. (ed.) & Mitchell, C. J. (ed.), 2014, Springer-Verlag. 257 p. (Lecture Notes in Computer Science; vol. 8893)

    Research output: Book/ReportAnthology

  90. Published

    Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings

    van der Merwe, T. (ed.), Mitchell, C. J. (ed.) & Mehrnezhad, M. (ed.), 30 Nov 2020, Springer. 169 p. (Lecture Notes in Computer Science; vol. 12529)

    Research output: Book/ReportAnthology

  91. Published

    Security Standardisation Research, Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings

    Chen, L. (ed.), McGrew, D. A. (ed.) & Mitchell, C. J. (ed.), Dec 2016, Springer-Verlag. 275 p. (Lecture Notes in Computer Science; vol. 10074)

    Research output: Book/ReportAnthology

  92. Published

    Trusted Computing

    Mitchell, C. J. (ed.), 2005, IEE Press. 313 p.

    Research output: Book/ReportAnthology

  93. Published

    Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings

    Chen, L. (ed.), Mitchell, C. J. (ed.) & Martin, A. (ed.), 2009, Springer-Verlag. 263 p. (Lecture Notes in Computer Science; vol. 5471)

    Research output: Book/ReportAnthology

  94. Published

    Trusted Systems: 4th International Conference, InTrust 2012, London, UK, December 17-18, 2012, Proceedings

    Mitchell, C. J. (ed.) & Tomlinson, A. (ed.), 12 Dec 2012, Springer-Verlag. 117 p. (Lecture Notes in Computer Science; no. 7711)

    Research output: Book/ReportAnthology

  95. Book › Research
  96. Published

    Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings

    Qing, S. (ed.), Mitchell, C. J. (ed.), Chen, L. (ed.) & Liu, D. (ed.), 8 May 2018, Cham, Switzerland: Springer-Verlag. 689 p. (Lecture Notes in Computer Science; vol. 10631)

    Research output: Book/ReportBook

  97. Published

    Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

    De Capitani di Vimercati, S. (ed.) & Mitchell, C. J. (ed.), 2013, Springer-Verlag. 195 p. (Lecture Notes in Computer Science; vol. 7868)

    Research output: Book/ReportBook

  98. Published

    User's guide to cryptography and standards

    Dent, A. W. & Mitchell, C. J., 2005, Artech House.

    Research output: Book/ReportBook

  99. Working paper › Research
  100. Published

    Constructing orientable sequences

    Mitchell, C. J. & Wild, P. R., 6 Aug 2021, arXiv, 19 p.

    Research output: Working paper

  101. Published

    Does the IdP Mix-Up attack really work?

    Li, W. & Mitchell, C. J., 3 Jun 2016, 4 p.

    Research output: Working paper

  102. Published
  103. Published
  104. Published
  105. Published