Professor Chris Mitchell

  1. Article › Research › Peer-reviewed
  2. Published

    Infinite families of quasiperfect and doubly quasiperfect binary arrays

    Jedwab, J. & Mitchell, C. J., 1990, In: Electronics Letters. 26, p. 294-295 2 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Key control in key agreement protocols

    Mitchell, C. J., Ward, M. & Wilson, P., 1998, In: Electronics Letters. 34, p. 980-981 2 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Key recovery attack on ANSI retail MAC

    Mitchell, C. J., Feb 2003, In: Electronics Letters. 39, 4, p. 361-362

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Key storage in secure networks

    Mitchell, C. J. & Piper, F. C., 1988, In: Discrete Applied Mathematics. 21, 3, p. 215-228 14 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Key-minimal cryptosystems for unconditional secrecy

    Mitchell, C. J. & Godlewski, P., 1990, In: Journal of Cryptology. 3, 1, p. 1-25 25 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Limitations of challenge-response entity authentication

    Mitchell, C. J., Aug 1989, In: Electronics Letters. 25, 17, p. 1195-1196 2 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Making serial number based authentication robust against loss of state

    Mitchell, C. J., Jul 2000, In: Operating Systems Review. 34, 3, p. 56-59 4 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Malicious attacks on ad hoc network routing protocols

    Yau, P-W., Hu, S. & Mitchell, C. J., 2007, In: International Journal of Computer Research. 15, 1, p. 73-100 38 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Manual authentication for wireless devices

    Gehrmann, C., Mitchell, C. J. & Nyberg, K., Apr 2004, In: Cryptobytes. 7, 1, p. 29-37

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Matching key recovery mechanisms to business requirements

    Rantos, K. & Mitchell, C. J., 2005, In: Computers and Security. 24, 3, p. 232-245 14 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1...5 6 7 8 9 10 11 12 ...30 Next