Professor Chris Mitchell

  1. Article › Research › Peer-reviewed
  2. Published

    One-stage one-sided rearrangeable switching networks

    Mitchell, C. J. & Wild, P. R., Jan 1989, In: IEEE Transactions on Communications. 37, 1, p. 52-56 5 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Parsing ambiguities in authentication and key establishment protocols

    Chen, L. & Mitchell, C. J., 2010, In: International Journal of Electronic Security and Digital Forensics. 3, 1, p. 82-94 13 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Partial key recovery attack against RMAC

    Knudsen, L. R. & Mitchell, C. J., Feb 2005, In: Journal of Cryptology. 18, 4, p. 375-389 15 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Perfect binary arrays and difference sets

    Jedwab, J., Mitchell, C. J., Piper, F. C. & Wild, P., 1994, In: Discrete Mathematics. 125, p. 241-254 14 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Perfect Factors from Cyclic Codes and Interleaving

    Mitchell, C. J. & Paterson, K. G., 1998, In: SIAM Journal on Discrete Mathematics. 11, p. 241-264 24 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Permutations with restricted displacement

    Beker, H. J. & Mitchell, C. J., 1987, In: SIAM Journal on Algebraic and Discrete Methods. 8, p. 338-363 26 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    PKI standards

    Mitchell, C. J., Dec 2000, In: Information Security Technical Report. 5, 4, p. 17-32 16 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Redundant integer representations and fast exponentiation

    Gollmann, D., Han, Y. & Mitchell, C. J., 1996, In: Designs, Codes and Cryptography. 7, p. 135-151 17 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Remarks on KRA's key recovery block format

    Rantos, K. & Mitchell, C. J., 1999, In: Electronics Letters. 35, p. 632-634 3 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Scalable RFID security protocols supporting tag ownership transfer

    Song, B. & Mitchell, C. J., 2011, In: Computer Communications. 34, 4, p. 556-566 11 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Security defects in C.C.I.T.T. Recommendation X.509 - The directory authentication framework

    I'Anson, C. & Mitchell, C. J., Apr 1990, In: Computer Communication Review. 20, 2, p. 30-34 5 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Security issues in a group key establishment protocol

    Mitchell, C. J., Mar 2019, In: The Computer Journal. 62, 3, p. 373-376 4 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Solutions to the multidestination secure electronic mail problem

    Mitchell, C. J. & Walker, M., 1988, In: Computers and Security. 7, p. 483-488 6 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Standardising authentication protocols based on public key techniques

    Mitchell, C. J. & Thomas, A., 1993, In: Journal of Computer Security. 2, p. 23-36 14 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2005, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-B, p. 2837-2847 11 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Switch minimisation for a simple bidirectional network

    Mitchell, C. J. & Wild, P. R., 1988, In: Electronics Letters. 24, 20, p. 1284-1286 3 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Switch reduction for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1987, In: Electronics Letters. 23, p. 346-347 2 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Switching networks for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1988, In: Ars Combinatoria. 25A, p. 89-94 6 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Tactical decompositions of designs

    Beker, H. J., Mitchell, C. J. & Piper, F. C., 1982, In: Aequationes Mathematicae. 25, p. 123-152 30 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    The combinatorics of perfect authentication schemes

    Mitchell, C. J., Walker, M. & Wild, P. R., 1994, In: SIAM Journal on Discrete Mathematics. 7, 1, p. 102-107 6 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    The cost of reducing key-storage requirements in secure networks

    Mitchell, C. J. & Piper, F. C., 1987, In: Computers and Security. 6, 4, p. 339-341 3 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., Jun 2020, In: Computers and Security. 93, p. 1-11 11 p., 101825.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    The Royal Holloway TTP-based key escrow scheme

    Mitchell, C. J., 1996, In: Information Security Technical Report. 1, 1, p. 63-69 7 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Too little too late: Can we control browser fingerprinting?

    Al-Fannah, N. M. & Mitchell, C., 7 Jan 2020, In: Journal of Intellectual Capital. 21, 2, p. 165-180 16 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Truncation attacks on MACs

    Mitchell, C. J., Jun 2003, In: Electronics Letters. 39, 20, p. 1439-1440 2 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Trusted computing: Security and applications

    Gallery, E. M. & Mitchell, C. J., 2009, In: Cryptologia. 33, p. 217-245 29 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Ubiquitous one-time password service using the Generic Authentication Architecture

    Chen, C., Mitchell, C. J. & Tang, S., 2013, In: Mobile Networks and Applications. 18, 5, p. 738-747 10 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Yet another insecure group key distribution scheme using secret sharing

    Mitchell, C., Mar 2021, In: Journal of Information Security and Applications. 57, 4 p., 102713.

    Research output: Contribution to journalArticlepeer-review

  30. Comment/debate › Research › Peer-reviewed
  31. Published

    Comment: Horng's identification scheme based on Shamir's 'RSA for paranoids'

    Mitchell, C. J. & Ng, S-L., 2000, In: Electronics Letters. 36, 5, p. 422-422 1 p.

    Research output: Contribution to journalComment/debatepeer-review

  32. Published

    Comment: Signature scheme based on discrete logarithm without using one-way hash-function.

    Yeun, C. Y., Mitchell, C. J. & Ng, S-L., 1998, In: Electronics Letters. 34, 24, p. 2329-2330 2 p.

    Research output: Contribution to journalComment/debatepeer-review

  33. Published

    Comments on mutual authentication and key exchange protocols for low power wireless communications

    Ng, S-L. & Mitchell, C. J., 2004, In: IEEE Communications Letters. 8, 4, p. 262-263 2 p.

    Research output: Contribution to journalComment/debatepeer-review

  34. Chapter › Research
  35. Published

    A delegation framework for Liberty

    Alrodhan, W. & Mitchell, C. J., 2008, Proceedings: 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), 10-11 July 2008, Liverpool, UK. Haggerty, J. & Merabti, M. (eds.). p. 67-73 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    Building general purpose security services on trusted computing

    Chen, C., Mitchell, C. J. & Tang, S., 2012, Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers. Chen, L., Yung, M. & Zhu, L. (eds.). Springer-Verlag, Vol. 7222. p. 16-31 16 p. (Lecture Notes in Computer Science; no. 7222).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Published

    Crimeware and Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G., 2008, Crimeware: Understanding New Attacks and Defenses. Jacobsson, M. & Ramzan, Z. (eds.). Addison-Wesley/Symantec Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  38. Published

    Cryptography and Cryptanalysis

    Mitchell, C. J. & Piper, F. C., 1990, Handbook of Applicable Mathematics: Supplement. Ledermann, W., Lloyd, E., Vajda, S. & Alexander, C. (eds.). John Wiley & Sons, p. 53-92 40 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  39. Published

    Cryptography for mobile security

    Mitchell, C. J., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 3-10 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  40. Published

    Developments in security mechanism standards

    Mitchell, C. J., 2000, Internet and Intranet Security Management: Risks and Solutions. Janczewski, L. J. (ed.). Idea Group Publishing, p. 185-246 62 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  41. Published

    Digital signatures

    Mitchell, C. J., Piper, F. C. & Wild, P., 1992, Contemporary cryptology: The science of information integrity . Simmons, G. J. (ed.). IEEE, p. 325-378 54 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  42. Published

    Enhancing user privacy using trusted computing

    Gajparia, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 239-250 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  43. Published

    Interoperation Between a Conventional PKI and an ID-Based Infrastructure

    Price, G. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, p. 73-85 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  44. Published

    Management of secure systems and security within OSI

    Mitchell, C. J., 1993, Information Security. Ettinger, J. E. (ed.). Chapman & Hall, p. 47-60 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  45. Published

    Padding oracle attacks on CBC-mode encryption with random and secret IVs

    Yau, A. K. L., Paterson, K. G. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer, p. 299-319 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  46. Published

    Privacy in identity and access management systems

    Pashalidis, A. & Mitchell, C. J., 2012, Digital Identity and Access Management: Technologies and Frameworks. Sharman, R., Smith, S. D. & Gupta, M. (eds.). IGI Global, p. 316-328

    Research output: Chapter in Book/Report/Conference proceedingChapter

  47. Published

    Privacy, compliance and the cloud

    Mitchell, C. J., 9 Mar 2016, Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, p. 3-14 12 p. (» Computer Communications and Networks).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  48. Published

    Secure Billing for Mobile Information Services in UMTS

    Martin, K. M., Preneel, B., Mitchell, C. J., Hitz, H. J., Horn, G., Poliakova, A. & Howard, P., 1998, Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, (Proceedings of the Fifth International Conference, IS&N 98, Antwerp, Belgium, 25-28 May 1998) . Trigila, S., Mullery, A., Campolargo, M. & Mampaey, M. (eds.). Springer-Verlag, Vol. 1430. p. 535-548 14 p. (Lecture Notes in Computer Science; no. 1430).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  49. Published

    Security in future mobile multimedia networks

    Mitchell, C. J. & Chen, LI., 1999, Insights into Mobile Multimedia Communications. Bull, D. R., Canagarajah, C. N. & Nix, A. R. (eds.). Academic Press, p. 177-190 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  50. Published

    Security: a technical approach

    Piper, F. C. & Mitchell, C. J., 2000, E-commerce Handbook. Clapperton, G. (ed.). Gee Publishing, p. 9/11-9/20 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  51. Published

    Single sign-on using TCG-conformant platforms

    Pashalidis, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 175-193 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  52. Published

    The personal PKI

    Mitchell, C. J. & Schaffelhofer, R., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 35-61 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  53. Published

    Trialling Secure Billing with Trusted Third Party Support for UMTS Applications

    Horn, G., Howard, P., Martin, K. M., Mitchell, C. J., Preneel, B. & Rantos, K., 1998, Proceedings of 3rd ACTS Mobile Communications Summit, Rhodes, Greece, 9-11 June 1998. p. 574-579 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter