Professor Chris Mitchell

  1. 1978
  2. Published

    A construction method for point divisible designs

    Beker, H. J. & Mitchell, C. J., 1978, In : Journal of Statistical Planning and Inference. 2, 3, p. 293-306 14 p.

    Research output: Contribution to journalArticle

  3. 1979
  4. Published

    An infinite family of symmetric designs

    Mitchell, C. J., 1979, In : Discrete Mathematics. 26, p. 247-250 4 p.

    Research output: Contribution to journalArticle

  5. 1982
  6. Published

    Tactical decompositions of designs

    Beker, H. J., Mitchell, C. J. & Piper, F. C., 1982, In : Aequationes Mathematicae. 25, p. 123-152 30 p.

    Research output: Contribution to journalArticle

  7. 1984
  8. Published

    A comparison of the cryptographic requirements for digital secure speech systems operating at different bit rates

    Mitchell, C. J., 1984, International conference on Secure Communication Systems, IEE, London, 22-23rd February 1984. IEE Press, p. 32-37 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Group divisible designs with dual properties

    Mitchell, C. J., 1984, In : Mitteilungen aus dem Mathematischen Seminar Giessen. 165, p. 105-117 13 p.

    Research output: Contribution to journalArticle

  10. 1985
  11. Published

    A classification of time element speech scramblers

    Mitchell, C. J. & Piper, F. C., Nov 1985, In : Journal of the Institution of Electronic and Radio Engineers. 55, 11/12, p. 391-396 6 p.

    Research output: Contribution to journalArticle

  12. 1987
  13. Published

    Permutations with restricted displacement

    Beker, H. J. & Mitchell, C. J., 1987, In : SIAM Journal on Algebraic and Discrete Methods. 8, p. 338-363 26 p.

    Research output: Contribution to journalArticle

  14. Published

    Switch reduction for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1987, In : Electronics Letters. 23, p. 346-347 2 p.

    Research output: Contribution to journalArticle

  15. Published

    The cost of reducing key-storage requirements in secure networks

    Mitchell, C. J. & Piper, F. C., 1987, In : Computers and Security. 6, 4, p. 339-341 3 p.

    Research output: Contribution to journalArticle

  16. 1988
  17. Published

    Key storage in secure networks

    Mitchell, C. J. & Piper, F. C., 1988, In : Discrete Applied Mathematics. 21, 3, p. 215-228 14 p.

    Research output: Contribution to journalArticle

  18. Published

    Solutions to the multidestination secure electronic mail problem

    Mitchell, C. J. & Walker, M., 1988, In : Computers and Security. 7, p. 483-488 6 p.

    Research output: Contribution to journalArticle

  19. Published

    Switch minimisation for a simple bidirectional network

    Mitchell, C. J. & Wild, P. R., 1988, In : Electronics Letters. 24, 20, p. 1284-1286 3 p.

    Research output: Contribution to journalArticle

  20. Published

    Switching networks for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1988, In : Ars Combinatoria. 25A, p. 89-94 6 p.

    Research output: Contribution to journalArticle

  21. Published

    The security architecture of the secure mobile messaging demonstrator

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1988, Proceedings of UK IT 88. IED, Swansea, p. 171-174 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Comment on 'Existence of one-dimensional perfect binary arrays'

    Mitchell, C. J., 26 May 1988, In : Electronics Letters. 24, 11, p. 714

    Research output: Contribution to journalArticle

  23. Published

    Constructing new perfect binary arrays

    Jedwab, J. & Mitchell, C. J., 26 May 1988, In : Electronics Letters. 24, 11, p. 650-652 3 p.

    Research output: Contribution to journalArticle

  24. 1989
  25. Published

    A remark on hash functions for message authentication

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1989, In : Computers and Security. 8, 1, p. 55-58 4 p.

    Research output: Contribution to journalArticle

  26. Published

    Another postage stamp problem

    Mitchell, C. J., 1989, In : The Computer Journal. 32, p. 374-376 3 p.

    Research output: Contribution to journalArticle

  27. Published

    Comment on 'Blocking method for RSA cryptosystem without expanding cipher length'

    Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1527 1 p.

    Research output: Contribution to journalArticle

  28. Published

    Distance-invariant error control codes from combinatorial designs

    Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1528-1529 2 p.

    Research output: Contribution to journalArticle

  29. Published

    Minimum weight modified signed-digit representations and fast exponentiation

    Jedwab, J. & Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1171-1172 2 p.

    Research output: Contribution to journalArticle

  30. Published

    Multi-destination secure electronic mail

    Mitchell, C. J., 1989, In : The Computer Journal. 32, 1, p. 13-15 3 p.

    Research output: Contribution to journalArticle

  31. Published

    OSI and X.400 security

    Mitchell, C. J. & Walker, M., 1989, Proceedings of COMPSEC 89, London, October 1989. Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 145-163 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Speech security and permanents of (0,1) matrices

    Mitchell, C. J., 1989, Cryptography and Coding: Proceedings of the IMA Cryptography and Coding Conference, Cirencester, December 1986. Beker, H. J. & Piper, F. C. (eds.). Oxford University Press, p. 231-240 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    The security issue

    Mitchell, C. J., 1989, Proceedings of Value Added Network Services for Europe, London, September 1989. London: IBC Technical Services Ltd, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...12 Next