Professor Chris Mitchell

  1. 2005
  2. Published

    Comments on two anonymous conference key distribution systems

    Tang, Q. & Mitchell, C. J., Oct 2005, In : Computer Standards & Interfaces. 27, 7, p. 397-400 4 p.

    Research output: Contribution to journalArticle

  3. Published

    Cryptanalysis of two identification schemes based on an ID-based cryptosystem

    Tang, Q. & Mitchell, C. J., Oct 2005, In : IEE Proceedings on Communications. 152, 5, p. 723-724 2 p.

    Research output: Contribution to journalArticle

  4. Published

    Partial key recovery attack against RMAC

    Knudsen, L. R. & Mitchell, C. J., Feb 2005, In : Journal of Cryptology. 18, 4, p. 375-389 15 p.

    Research output: Contribution to journalArticle

  5. Published

    A scanning tool for PC root public key stores

    Alsaid, A. & Mitchell, C. J., 2005, WEWoRC 2005 - Western European Workshop on Research in Cryptology, Leuven, Belgium, July 2005. Wolf, C., Lucks, S. & Yau, P-W. (eds.). Gesellschaft fuer Informatik , p. 45-52 8 p. (LNI; vol. P-74).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Analysis of the Bit-Search Generator and sequence compression techniques

    Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize, B. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer-Verlag, Vol. 3557. p. 196-214 19 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Comments on a cryptographic key assignment scheme

    Tang, Q. & Mitchell, C. J., 2005, In : Computer Standards & Interfaces. 27, p. 323-326 4 p.

    Research output: Contribution to journalArticle

  8. Published

    Cryptanalysis of two variants of PCBC mode when used for message integrity

    Mitchell, C. J., 2005, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Boyd, C. & Gonzalez-Nieto, J. (eds.). Springer-Verlag, Vol. 3574. p. 560-571 12 p. (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Dynamic content attacks on digital signatures

    Alsaid, A. & Mitchell, C. J., 2005, In : Information and Computer Security . 13, 4, p. 328-336 9 p.

    Research output: Contribution to journalArticle

  10. Published

    Efficient compilers for authenticated group key exchange

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 192-197 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Enhancing user privacy using trusted computing

    Gajparia, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 239-250 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Mitchell, C. J., 2005, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings. Zhou, J., Lopez, J., R. H. D. & Bao, F. (eds.). Springer-Verlag, Vol. 3650. p. 244-258 15 p. (Lecture Notes in Computer Science; vol. 3650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Improving IP address autoconfiguration security in MANETs using trust modelling

    Hu, S. & Mitchell, C. J., 2005, Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings. Jia, X., Wu, J. & He, Y. (eds.). Springer-Verlag, Vol. 3794. p. 83-92 10 p. (Lecture Notes in Computer Science; vol. 3794).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Installing fake root keys in a PC

    Alsaid, A. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, Vol. 3545. p. 227-239 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Interoperation Between a Conventional PKI and an ID-Based Infrastructure

    Price, G. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, p. 73-85 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  16. Published

    Matching key recovery mechanisms to business requirements

    Rantos, K. & Mitchell, C. J., 2005, In : Computers and Security. 24, 3, p. 232-245 14 p.

    Research output: Contribution to journalArticle

  17. Published

    On the security of some password-based key agreement schemes

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 149-154 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Overcoming channel bandwidth constraints in secure SIM applications

    Macdonald, J. A., Sirett, W. G. & Mitchell, C. J., 2005, Security and privacy in the age of ubiquitous computing: Proceedings of IFIP Working Groups 11.2/8.8 Small Systems Security/Smart Cards Working Conference at 20th IFIP International Information Security Conference (SEC 2005), Makuhari-Messe, Chiba, Japan, May 2005. Sasaki, R., Qing, S. & Okamoto, E. (eds.). Springer-Verlag, p. 539–-549

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Padding oracle attacks on CBC-mode encryption with random and secret IVs

    Yau, A. K. L., Paterson, K. G. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer, p. 299-319 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Partial key recovery attacks on XCBC, TMAC and OMAC

    Mitchell, C. J., 2005, Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings. Smart, N. (ed.). Springer-Verlag, Vol. 3796. p. 155-167 13 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Security properties of two authenticated conference key agreement protocols

    Tang, Q. & Mitchell, C. J., 2005, Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings. Qing, S., Mao, W., Lopez, J. & Wang, G. (eds.). Springer-Verlag, Vol. 3783. p. 304-314 11 p. (Lecture Notes in Computer Science; vol. 3783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Single sign-on using TCG-conformant platforms

    Pashalidis, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 175-193 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. Published

    Spy agents: Evaluating trust in remote environments

    Kalogridis, G., Mitchell, C. J. & Clemo, G., 2005, Proceedings of the 2005 International Conference on Security and Management (SAM '05), June 2005, Las Vegas, USA. Arabnia, H. R. (ed.). CSREA Press, p. 405-411 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2005, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-B, p. 2837-2847 11 p.

    Research output: Contribution to journalArticle

  25. Published

    Trusted Computing

    Mitchell, C. J. (ed.), 2005, IEE Press. 313 p.

    Research output: Book/ReportAnthology

  26. Published

    User's guide to cryptography and standards

    Dent, A. W. & Mitchell, C. J., 2005, Artech House.

    Research output: Book/ReportBook

  27. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    What is trusted computing?

    Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  29. 2004
  30. Published

    Manual authentication for wireless devices

    Gehrmann, C., Mitchell, C. J. & Nyberg, K., Apr 2004, In : Cryptobytes. 7, 1, p. 29-37

    Research output: Contribution to journalArticle

  31. Published

    2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2004, Proceedings: 5th World Wireless Congress (WWC 2004), San Francisco, USA, May 25-28, 2004. Delson Group, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    A secure GSM-based Murabaha transaction

    Al-Meaither, M. & Mitchell, C. J., 2004, Proceedings of ICTTA 04, The 1st International Conference on Information & Communication Technologies from Theory to Applications, Damascus, Syria, April 2004. IEEE, p. 77-78 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    A security model for anonymous credential systems

    Pashalidis, A. & Mitchell, C. J., 2004, Information Security Management, Education and Privacy, Proceedings of the 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems, I-NetSec'04. Deswarte, Y., Cuppens, F., Jajodia, S. & Wang, L. (eds.). Kluwer Academic Publishers, p. 183-189 (IFIP Conference Proceedings; vol. 148).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Comments on mutual authentication and key exchange protocols for low power wireless communications

    Ng, S-L. & Mitchell, C. J., 2004, In : IEEE Communications Letters. 8, 4, p. 262-263 2 p.

    Research output: Contribution to journalComment/debate

  35. Published

    Cryptography for mobile security

    Mitchell, C. J., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 3-10 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    Digitally signed documents - Ambiguities and solutions

    Alsaid, A. & Mitchell, C. J., 2004, Proceedings - International Network Conference 2004 (INC 2004), University of Plymouth, UK, July 2004. Plymouth University, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Heterogeneous Internet access via PANA/UMTS

    Pagliusi, P. S. & Mitchell, C. J., 2004, Proceedings of the 3rd International Conference on Information Security, Hardware/Software Codesign and Computer Networks - ISCOCO 2004, Rio De Janeiro, Brazil, October 2004. World Scientific, 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Impostor: A single sign-on system for use from untrusted devices

    Pashalidis, A. & Mitchell, C. J., 2004, Proceedings of IEEE Globecom 2004, Global Telecommunications Conference, Dallas, Texas, USA, November/December 2004. IEEE, Vol. 4. p. 2191-2195

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Is entity authentication necessary?

    Mitchell, C. J. & Pagliusi, P., 2004, Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19 2002, Revised Papers. Springer-Verlag, Vol. 2004. p. 20-33 14 p. (Lecture Notes in Computer Science; vol. 2845).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Security for Mobility

    Mitchell, C. J. (ed.), 2004, IEE Press. 440 p.

    Research output: Book/ReportAnthology

  41. Published

    The Location Information Preference Authority: Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2004, Nordsec 2004, The 9th Nordic Workshop on Secure IT-systems, Helsinki University of Technology, Finland, November 2004. Liimatainen, S. & Virtanen, T. (eds.). p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    The personal PKI

    Mitchell, C. J. & Schaffelhofer, R., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 35-61 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  43. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. 2003
  45. Published

    Truncation attacks on MACs

    Mitchell, C. J., Jun 2003, In : Electronics Letters. 39, 20, p. 1439-1440 2 p.

    Research output: Contribution to journalArticle

  46. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC

    Knudsen, L. R. & Mitchell, C. J., May 2003, In : Discrete Applied Mathematics. 128, 1, p. 181-191

    Research output: Contribution to journalArticle

  47. Published

    Key recovery attack on ANSI retail MAC

    Mitchell, C. J., Feb 2003, In : Electronics Letters. 39, 4, p. 361-362

    Research output: Contribution to journalArticle

  48. Published

    A secure electronic Murabaha transaction

    Al-Meaither, M. & Mitchell, C. J., 2003, Proceedings of eTransformation, 16th Bled eCommerce Conference, Bled, Slovenia, June 2003. p. 662-674

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    A secure electronic payment scheme for charity donations

    Al-Meaither, M. & Mitchell, C. J., 2003, E-Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, Vol. 2738. p. 50-61 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    A taxonomy of single sign-on systems

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security and Privacy - 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11 2003, Proceedings. Safavi-Naini, R. & Seberry, J. (eds.). Springer-Verlag, Vol. 2727. p. 249-264 16 p. (Lecture Notes in Computer Science; vol. 2727).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Enhancing e-commerce security using GSM authentication

    Khu-smith, V. & Mitchell, C. J., 2003, -Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, p. 72-83 12 p. (Lecture Notes in Computer Science; vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Extending EMV to support Murabaha transactions

    Al-Meaither, M. & Mitchell, C. J., 2003, NORDSEC 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems - Encouraging Cooperation, Gjøvik University College, Norway, October 2003. p. 95-108 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Improvement of modified authenticated key agreement protocol

    Hsu, C-L., Wu, T-S., Wu, T-C. & Mitchell, C. J., 2003, In : Applied Mathematics and Computation. 142, p. 305-308

    Research output: Contribution to journalArticle