Professor Chris Mitchell

  1. 2015
  2. E-pub ahead of print

    Improving Air Interface User Privacy in Mobile Telephony

    Khan, M. & Mitchell, C. J., 9 Dec 2015, Security Standardisation Research, Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 165-184 20 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Addressing Threats to Real-World Identity Management Systems

    Li, W. & Mitchell, C., 16 Oct 2015, ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Wiesbaden: Springer Vieweg, p. 251-259 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Information Security, 18th International Conference, ISC 2015. Trondheim, Norway, September 9-11, 2015. Proceedings.

    Lopez, J. (ed.) & Mitchell, C. J. (ed.), 2015, Springer-Verlag. 570 p. (Lecture Notes in Computer Science; vol. 9290)

    Research output: Book/ReportAnthology

  5. 2014
  6. Published

    Another Look at Privacy Threats in 3G Mobile Telephony

    Alam, S. & Mitchell, C. J., 2014, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Susilo, W. & Mu, Y. (eds.). Berlin: Springer-Verlag, p. 386-396 11 p. (Lecture Notes in Computer Science; vol. 8544).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Security Issues in OAuth 2.0 SSO Implementations

    Li, W. & Mitchell, C. J., 2014, Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Chow, S., Camenisch, J., Hui, L. & Yiu, S-M. (eds.). Springer-Verlag, p. 529-541 13 p. (Lecture Notes in Computer Science; vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings

    Chen, LI. (ed.) & Mitchell, C. J. (ed.), 2014, Springer-Verlag. 257 p. (Lecture Notes in Computer Science; vol. 8893)

    Research output: Book/ReportAnthology

  9. 2013
  10. Published

    A novel stateless authentication protocol

    Mitchell, C. J., 2013, Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009, Revised Selected Papers. Christianson, B., Malcolm, J. A., Matyas, V. & Roe, M. (eds.). Springer-Verlag, Vol. 7028. p. 269-274 6 p. (Lecture Notes in Computer Science; no. 7028).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Analysing the IOBC Authenticated Encryption Mode

    Mitchell, C. J., 2013, Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, QLD, Australia, July 2013, Proceedings. Boyd, C. & Simpson, L. (eds.). Springer-Verlag, Vol. 7959. p. 1-12 12 p. (Lecture Notes in Computer Science; vol. 7959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Building general-purpose security services on EMV payment cards

    Chen, C., Tang, S. & Mitchell, C. J., 2013, Security and Privacy in Communication Networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Springer-Verlag, p. 29-44 16 p. (LNICST; vol. 106).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In : Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticle

  14. Published

    Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013. London, UK, April 8-9, 2013. Proceedings

    Fischer-Hübner, S. (ed.), de Leeuw, E. (ed.) & Mitchell, C. J. (ed.), 2013, Springer-Verlag. (IFIP Advances in Information and Communications Technology; no. 396)

    Research output: Book/ReportAnthology

  15. Published

    Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

    De Capitani di Vimercati, S. (ed.) & Mitchell, C. J. (ed.), 2013, Springer-Verlag. 195 p. (Lecture Notes in Computer Science; vol. 7868)

    Research output: Book/ReportBook

  16. Published

    Ubiquitous one-time password service using the Generic Authentication Architecture

    Chen, C., Mitchell, C. J. & Tang, S., 2013, In : Mobile Networks and Applications. 18, 5, p. 738-747 10 p.

    Research output: Contribution to journalArticle

  17. 2012
  18. Published

    Trusted Systems: 4th International Conference, InTrust 2012, London, UK, December 17-18, 2012, Proceedings

    Mitchell, C. J. (ed.) & Tomlinson, A. (ed.), 12 Dec 2012, Springer-Verlag. 117 p. (Lecture Notes in Computer Science; no. 7711)

    Research output: Book/ReportAnthology

  19. Published

    A Universal Client-based Identity Management Tool

    Al-Sinani, H. S. & Mitchell, C. J., 2012, Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers: 8th European Workshop on Public Key Infrastructures, Services and Applications, Leuven, Belgium, 15th/16th September 2011. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Springer-Verlag, p. 49-74 26 p. (Lecture Notes in Computer Science; no. 7163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Building general purpose security services on trusted computing

    Chen, C., Mitchell, C. J. & Tang, S., 2012, Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers. Chen, L., Yung, M. & Zhu, L. (eds.). Springer-Verlag, Vol. 7222. p. 16-31 16 p. (Lecture Notes in Computer Science; no. 7222).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    Generating certification authority authenticated public keys in ad hoc networks

    Kounga, G., Mitchell, C. J. & Walter, T., 2012, In : Security and Communication Networks. 5, 1, p. 87-106 20 p.

    Research output: Contribution to journalArticle

  22. Published

    Privacy in identity and access management systems

    Pashalidis, A. & Mitchell, C. J., 2012, Digital Identity and Access Management: Technologies and Frameworks. Sharman, R., Smith, S. D. & Gupta, M. (eds.). IGI Global, p. 316-328

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. 2011
  24. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  25. Unpublished

    CardSpace-OpenID Integration for CardSpace Users

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. (Technical Report Series; no. RHUL-MA-2011-12)

    Research output: Book/ReportOther report

  26. Unpublished

    Client-based CardSpace-Shibboleth Interoperation

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-13)

    Research output: Book/ReportOther report

  27. Published

    Client-based CardSpace-OpenID Interoperation

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of ISCIS, 26th International Symposium on Computer and Information Sciences, London, UK, 26-28 September 2011. Gelenbe, E., Lent, R. & Sakellari, G. (eds.). London: Springer-Verlag, p. 387-393 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Enhancing CardSpace Authentication Using a Mobile Device

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings. Li, Y. (ed.). Berlin: Springer-Verlag, Vol. 6818. p. 201-216 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Extending the Scope of CardSpace

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. Orgun, M. A., Elci, A., Makarevich, O. B., Huss, S. A., Pieprzyk, J., Babenko, L. K., Chefranov, A. G. & Shankaran, R. (eds.). New York: ACM, p. 235-238 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Scalable RFID security protocols supporting tag ownership transfer

    Song, B. & Mitchell, C. J., 2011, In : Computer Communications. 34, 4, p. 556-566 11 p.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...12 Next