Professor Chris Mitchell

  1. Article › Research › Peer-reviewed
  2. Published

    Dynamic content attacks on digital signatures

    Alsaid, A. & Mitchell, C. J., 2005, In : Information and Computer Security . 13, 4, p. 328-336 9 p.

    Research output: Contribution to journalArticle

  3. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In : Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticle

  4. Published

    Enumerating Boolean functions of cryptographic significance

    Mitchell, C. J., 1990, In : Journal of Cryptology. 2, p. 155-170 16 p.

    Research output: Contribution to journalArticle

  5. Published

    Fixing a problem in the Helsinki protocol

    Mitchell, C. J. & Yeun, C. Y., 1998, In : Operating Systems Review. 32, 4, p. 21-24 4 p.

    Research output: Contribution to journalArticle

  6. Published

    Generating certification authority authenticated public keys in ad hoc networks

    Kounga, G., Mitchell, C. J. & Walter, T., 2012, In : Security and Communication Networks. 5, 1, p. 87-106 20 p.

    Research output: Contribution to journalArticle

  7. Published

    Group divisible designs with dual properties

    Mitchell, C. J., 1984, In : Mitteilungen aus dem Mathematischen Seminar Giessen. 165, p. 105-117 13 p.

    Research output: Contribution to journalArticle

  8. Published

    ID-based cryptography using symmetric primitives

    Mitchell, C. J., Piper, F. C. & Wild, P. R., 3 Jul 2007, In : Designs, Codes and Cryptography. 44, p. 249-262 14 p.

    Research output: Contribution to journalArticle

  9. Published

    Improvement of modified authenticated key agreement protocol

    Hsu, C-L., Wu, T-S., Wu, T-C. & Mitchell, C. J., 2003, In : Applied Mathematics and Computation. 142, p. 305-308

    Research output: Contribution to journalArticle

  10. Published

    Improving the security of CardSpace

    Alrodhan, W. & Mitchell, C. J., 2009, In : EURASIP Journal on Information Security. 2009, 8 p.

    Research output: Contribution to journalArticle

  11. Published

    Infinite families of quasiperfect and doubly quasiperfect binary arrays

    Jedwab, J. & Mitchell, C. J., 1990, In : Electronics Letters. 26, p. 294-295 2 p.

    Research output: Contribution to journalArticle

Previous 1...4 5 6 7 8 9 10 11 ...30 Next