Professor Chris Mitchell

  1. Article › Research › Peer-reviewed
  2. Published

    Parsing ambiguities in authentication and key establishment protocols

    Chen, L. & Mitchell, C. J., 2010, In: International Journal of Electronic Security and Digital Forensics. 3, 1, p. 82-94 13 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Partial key recovery attack against RMAC

    Knudsen, L. R. & Mitchell, C. J., Feb 2005, In: Journal of Cryptology. 18, 4, p. 375-389 15 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Perfect binary arrays and difference sets

    Jedwab, J., Mitchell, C. J., Piper, F. C. & Wild, P., 1994, In: Discrete Mathematics. 125, p. 241-254 14 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Perfect Factors from Cyclic Codes and Interleaving

    Mitchell, C. J. & Paterson, K. G., 1998, In: SIAM Journal on Discrete Mathematics. 11, p. 241-264 24 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Permutations with restricted displacement

    Beker, H. J. & Mitchell, C. J., 1987, In: SIAM Journal on Algebraic and Discrete Methods. 8, p. 338-363 26 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    PKI standards

    Mitchell, C. J., Dec 2000, In: Information Security Technical Report. 5, 4, p. 17-32 16 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Redundant integer representations and fast exponentiation

    Gollmann, D., Han, Y. & Mitchell, C. J., 1996, In: Designs, Codes and Cryptography. 7, p. 135-151 17 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Remarks on KRA's key recovery block format

    Rantos, K. & Mitchell, C. J., 1999, In: Electronics Letters. 35, p. 632-634 3 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Scalable RFID security protocols supporting tag ownership transfer

    Song, B. & Mitchell, C. J., 2011, In: Computer Communications. 34, 4, p. 556-566 11 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Security defects in C.C.I.T.T. Recommendation X.509 - The directory authentication framework

    I'Anson, C. & Mitchell, C. J., Apr 1990, In: Computer Communication Review. 20, 2, p. 30-34 5 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Security issues in a group key establishment protocol

    Mitchell, C. J., Mar 2019, In: The Computer Journal. 62, 3, p. 373-376 4 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Solutions to the multidestination secure electronic mail problem

    Mitchell, C. J. & Walker, M., 1988, In: Computers and Security. 7, p. 483-488 6 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Standardising authentication protocols based on public key techniques

    Mitchell, C. J. & Thomas, A., 1993, In: Journal of Computer Security. 2, p. 23-36 14 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2005, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-B, p. 2837-2847 11 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Switch minimisation for a simple bidirectional network

    Mitchell, C. J. & Wild, P. R., 1988, In: Electronics Letters. 24, 20, p. 1284-1286 3 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Switch reduction for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1987, In: Electronics Letters. 23, p. 346-347 2 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Switching networks for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1988, In: Ars Combinatoria. 25A, p. 89-94 6 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Tactical decompositions of designs

    Beker, H. J., Mitchell, C. J. & Piper, F. C., 1982, In: Aequationes Mathematicae. 25, p. 123-152 30 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    The combinatorics of perfect authentication schemes

    Mitchell, C. J., Walker, M. & Wild, P. R., 1994, In: SIAM Journal on Discrete Mathematics. 7, 1, p. 102-107 6 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    The cost of reducing key-storage requirements in secure networks

    Mitchell, C. J. & Piper, F. C., 1987, In: Computers and Security. 6, 4, p. 339-341 3 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., Jun 2020, In: Computers and Security. 93, p. 1-11 11 p., 101825.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    The Royal Holloway TTP-based key escrow scheme

    Mitchell, C. J., 1996, In: Information Security Technical Report. 1, 1, p. 63-69 7 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Too little too late: Can we control browser fingerprinting?

    Al-Fannah, N. M. & Mitchell, C., 7 Jan 2020, In: Journal of Intellectual Capital. 21, 2, p. 165-180 16 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Truncation attacks on MACs

    Mitchell, C. J., Jun 2003, In: Electronics Letters. 39, 20, p. 1439-1440 2 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Trusted computing: Security and applications

    Gallery, E. M. & Mitchell, C. J., 2009, In: Cryptologia. 33, p. 217-245 29 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 4 5 6 7 8 ...12 Next