Professor Chris Mitchell

  1. Conference contribution › Research
  2. Published

    The use of Trusted Third Parties and Secure Billing in UMTS

    Chen, LI., Hitz, H-J., Horn, G., Howker, K., Kessler, V., Knudsen, L. R., Mitchell, C. J. & Radu, C., 1996, Proceedings of the ACTS Mobile Communications Summit, Granada, Spain, 27-29 November 1996. Vol. 2. p. 493-499 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Trashing IMSI catchers in mobile networks

    Khan, M. & Mitchell, C. J., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, July 18-20, 2017: WiSec '17 . Association for Computing Machinery (ACM), p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 22 Oct 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press, p. 664-672 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 2019, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Li, W., Mitchell, C. J. & Chen, T., 22 Dec 2018, Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers. Matyáš, V., Švenda, P., Stajano, F., Christianson, B. & Anderson, J. (eds.). Springer, p. 24-41 18 p. (Lecture Notes in Computer Science; vol. 11286).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Paper › Research › Not peer-reviewed
  22. Published

    Is security a lost cause?

    Mitchell, C. J., May 2010. 8 p.

    Research output: Contribution to conferencePaper

  23. Paper › Research › Peer-reviewed
  24. Published

    Ubiquitous one-time password service using generic authentication architecture

    Chen, C., Mitchell, C. J. & Tang, S., Nov 2010. 8 p.

    Research output: Contribution to conferencePaper

  25. Poster › Research › Not peer-reviewed
  26. Published

    Extending trusted computing as a security service

    Chen, C., Mitchell, C. J. & Tang, S., Dec 2010. 1 p.

    Research output: Contribution to conferencePoster

  27. Chapter (peer-reviewed) › Research › Peer-reviewed
  28. Published

    Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking

    Al-Fannah, N. M., Li, W. & Mitchell, C. J., 2018, Information Security : 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Springer, p. 481-501 21 p. (Lecture Notes in Computer Science; vol. 11060).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  29. Published

    Password Generators: Old Ideas and New

    AL Maqbali, F. & Mitchell, C., 17 Sep 2016, Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings. Foresti, S. & Lopez, J. (eds.). Springer-Verlag, p. 245-253 9 p. (Lecture Notes in Computer Science; vol. 9895).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

Previous 1...8 9 10 11 12 Next