Professor Chris Mitchell

  1. Article › Research › Peer-reviewed
  2. Published

    Distributing trust amongst multiple authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, In: Journal of Computer Security. 3, 4, p. 255-267 13 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Dynamic content attacks on digital signatures

    Alsaid, A. & Mitchell, C. J., 2005, In: Information and Computer Security . 13, 4, p. 328-336 9 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In: Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Enumerating Boolean functions of cryptographic significance

    Mitchell, C. J., 1990, In: Journal of Cryptology. 2, p. 155-170 16 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Fixing a problem in the Helsinki protocol

    Mitchell, C. J. & Yeun, C. Y., 1998, In: Operating Systems Review. 32, 4, p. 21-24 4 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Generating certification authority authenticated public keys in ad hoc networks

    Kounga, G., Mitchell, C. J. & Walter, T., 2012, In: Security and Communication Networks. 5, 1, p. 87-106 20 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Group divisible designs with dual properties

    Mitchell, C. J., 1984, In: Mitteilungen aus dem Mathematischen Seminar Giessen. 165, p. 105-117 13 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Mitchell, C. J., 23 Mar 2021, In: IET Information Security . 15, 3, p. 223-230 8 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    ID-based cryptography using symmetric primitives

    Mitchell, C. J., Piper, F. C. & Wild, P. R., 3 Jul 2007, In: Designs, Codes and Cryptography. 44, p. 249-262 14 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Improvement of modified authenticated key agreement protocol

    Hsu, C-L., Wu, T-S., Wu, T-C. & Mitchell, C. J., 2003, In: Applied Mathematics and Computation. 142, p. 305-308

    Research output: Contribution to journalArticlepeer-review

Previous 1...4 5 6 7 8 9 10 11 ...31 Next