dblp.uni-trier.dewww.uni-trier.de

Chris J. Mitchell Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
111EELiqun Chen, Chris J. Mitchell, Andrew Martin: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings Springer 2009
110EEOlivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings Springer 2009
109EEEimear Gallery, Chris J. Mitchell: Trusted Computing: Security and Applications. Cryptologia 33(3): 217-245 (2009)
2008
108EEGeorgios Kalogridis, Chris J. Mitchell: Using Non-adaptive Group Testing to Construct Spy Agent Routes. ARES 2008: 1013-1019
107EEWaleed A. Alrodhan, Chris J. Mitchell: A client-side CardSpace-Liberty integration architecture. IDtrust 2008: 1-7
106EEAdrian Leung, Liqun Chen, Chris J. Mitchell: On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). TRUST 2008: 179-190
105EEBoyeon Song, Chris J. Mitchell: RFID authentication protocol for low-cost tags. WISEC 2008: 140-147
104EEShane Balfe, Eimear Gallery, Chris J. Mitchell, Kenneth G. Paterson: Challenges for Trusted Computing. IEEE Security & Privacy 6(6): 60-66 (2008)
2007
103EESuranjith Ariyapperuma, Chris J. Mitchell: Security vulnerabilities in DNS and DNSSEC. ARES 2007: 335-342
102EEEimear Gallery, Chris J. Mitchell: Trusted Mobile Platforms. FOSAD 2007: 282-323
101EEWaleed A. Alrodhan, Chris J. Mitchell: Addressing privacy issues in CardSpace. IAS 2007: 285-291
100EEImad M. Abbadi, Chris J. Mitchell: Digital rights management using a mobile phone. ICEC 2007: 185-194
99EEChris J. Mitchell: Cryptanalysis of the EPBC Authenticated Encryption Mode. IMA Int. Conf. 2007: 118-128
98EEAdrian Leung, Chris J. Mitchell: Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. Ubicomp 2007: 73-90
97EEChris J. Mitchell, Fred Piper, Peter R. Wild: ID-based cryptography using symmetric primitives. Des. Codes Cryptography 44(1-3): 249-262 (2007)
2006
96 Adrian Leung, Chris J. Mitchell: A Service Discovery Threat Model for Ad Hoc Networks. SECRYPT 2006: 167-174
95 Sharon Nachtigal, Chris J. Mitchell: Modelling E-Business Security Using Business Processes. SECRYPT 2006: 459-464
94EEQiang Tang, Chris J. Mitchell: Cryptanalysis of a hybrid authentication protocol for large mobile networks. Journal of Systems and Software 79(4): 496-501 (2006)
93EEChris J. Mitchell: Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen). it - Information Technology 48(6): 321- (2006)
2005
92EEChris J. Mitchell: Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. ACISP 2005: 560-571
91EEQiang Tang, Chris J. Mitchell: On the Security of Some Password-Based Key Agreement Schemes. CIS (2) 2005: 149-154
90EEQiang Tang, Chris J. Mitchell: Efficient Compilers for Authenticated Group Key Exchange. CIS (2) 2005: 192-197
89EEAdil Alsaid, Chris J. Mitchell: Installing Fake Root Keys in a PC. EuroPKI 2005: 227-239
88EEGeraint Price, Chris J. Mitchell: Interoperation Between a Conventional PKI and an ID-Based Infrastructure. EuroPKI 2005: 73-85
87EEAline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, Chris J. Mitchell: Analysis of the Bit-Search Generator and Sequence Compression Techniques. FSE 2005: 196-214
86EEArnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell: Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. FSE 2005: 299-319
85EEQiang Tang, Chris J. Mitchell: Security Properties of Two Authenticated Conference Key Agreement Protocols. ICICS 2005: 304-314
84EEChris J. Mitchell: Partial Key Recovery Attacks on XCBC, TMAC and OMAC. IMA Int. Conf. 2005: 155-167
83EEChris J. Mitchell: Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? ISC 2005: 244-258
82EEShenglan Hu, Chris J. Mitchell: Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling. MSN 2005: 83-92
81 John A. MacDonald, William G. Sirett, Chris J. Mitchell: Overcoming Channel Bandwidth Constraints in Secure SIM Applications. SEC 2005: 539-550
80 Georgios Kalogridis, Chris J. Mitchell, Gary Clemo: Spy Agents: Evaluating Trust in Remote Environments. Security and Management 2005: 405-411
79 Adil Alsaid, Chris J. Mitchell: A Scanning Tool for PC Root Public Key Stores. WEWoRC 2005: 45-52
78EEQiang Tang, Chris J. Mitchell: Comments on a cryptographic key assignment scheme. Computer Standards & Interfaces 27(3): 323-326 (2005)
77EEQiang Tang, Chris J. Mitchell: Comments on two anonymous conference key distribution systems. Computer Standards & Interfaces 27(4): 397-400 (2005)
76EEKonstantinos Rantos, Chris J. Mitchell: Matching key recovery mechanisms to business requirements. Computers & Security 24(3): 232-245 (2005)
75EEAnand S. Gajparia, Chris J. Mitchell, Chan Yeob Yeun: Supporting User Privacy in Location Based Services. IEICE Transactions 88-B(7): 2837-2847 (2005)
74EEAdil Alsaid, Chris J. Mitchell: Dynamic content attacks on digital signatures. Inf. Manag. Comput. Security 13(4): 328-336 (2005)
73EELars R. Knudsen, Chris J. Mitchell: Partial Key Recovery Attack Against RMAC. J. Cryptology 18(4): 375-389 (2005)
2004
72EEAndreas Pashalidis, Chris J. Mitchell: Using EMV Cards for Single Sign-On. EuroPKI 2004: 205-217
71 Andreas Pashalidis, Chris J. Mitchell: A Security Model for Anonymous Credential Systems. International Information Security Workshops 2004: 183-198
70EEChris J. Mitchell: Limits to Anonymity When Using Credentials (Transcript of Discussion). Security Protocols Workshop 2004: 13-19
69EEAndreas Pashalidis, Chris J. Mitchell: Limits to Anonymity When Using Credentials. Security Protocols Workshop 2004: 4-12
2003
68EEAndreas Pashalidis, Chris J. Mitchell: A Taxonomy of Single Sign-On Systems. ACISP 2003: 249-264
67EELuciano Rila, Chris J. Mitchell: Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. ACNS 2003: 254-264
66EEMansour A. Al-Meaither, Chris J. Mitchell: A Secure Electronic Payment Scheme for Charity Donations. EC-Web 2003: 50-61
65EEVorapranee Khu-smith, Chris J. Mitchell: Enhancing E-commerce Security Using GSM Authentication. EC-Web 2003: 72-83
64EEChris J. Mitchell: Remote User Authentication Using Public Information. IMA Int. Conf. 2003: 360-369
63EEAndreas Pashalidis, Chris J. Mitchell: Single Sign-On Using Trusted Platforms. ISC 2003: 54-68
62 Niklas Borselius, Chris J. Mitchell: Securing FIPA Agent Communication. Security and Management 2003: 135-141
61EEPaulo S. Pagliusi, Chris J. Mitchell: PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. WISA 2003: 135-149
60EELars R. Knudsen, Chris J. Mitchell: Analysis of 3gpp-MAC and Two-key 3gpp-MAC. Discrete Applied Mathematics 128(1): 181-191 (2003)
2002
59EELuciano Rila, Chris J. Mitchell: Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication. CARDIS 2002
58 Chris J. Mitchell, Namhyun Hur: On the security of a structural proven signer ordering multisignature scheme. Communications and Multimedia Security 2002: 1-8
57 Sattam S. Al-Riyami, Chris J. Mitchell: Renewing crytographic timestamps. Communications and Multimedia Security 2002: 9-16
56EEVorapranee Khu-smith, Chris J. Mitchell: Using EMV Cards to Protect E-commerce Transactions. EC-Web 2002: 388-399
55 Pita Jarupunphol, Chris J. Mitchell: Implementation Aspects of SET/EMV. I3E 2002: 305-315
54EEChris J. Mitchell, Paulo S. Pagliusi: Is Entity Authentication Necessary? Security Protocols Workshop 2002: 20-33
53 Pita Jarupunphol, Chris J. Mitchell: E-commerce and the Media - Influences on Security Risk Perceptions. WITASI 2002: 163-174
52EEVorapranee Khu-smith, Chris J. Mitchell: Using GSM to enhance e-commerce security. Workshop Mobile Commerce 2002: 75-81
51EENiklas Borselius, Chris J. Mitchell, Aaron Wilson: A pragmatic alternative to undetachable signatures. Operating Systems Review 36(2): 6-11 (2002)
50EENiklas Borselius, Chris J. Mitchell, Aaron Wilson: On the value of threshold signatures. Operating Systems Review 36(4): 30-35 (2002)
2001
49EEKarl Brincat, Chris J. Mitchell: New CBC-MAC Forgery Attacks. ACISP 2001: 3-14
48EEVorapranee Khu-smith, Chris J. Mitchell: Enhancing the Security of Cookies. ICISC 2001: 132-145
47EENiklas Borselius, Chris J. Mitchell, Aaron Wilson: Undetachable Threshold Signatures. IMA Int. Conf. 2001: 239-244
46EEKonstantinos Rantos, Chris J. Mitchell: Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. IMA Int. Conf. 2001: 268-276
45EEKarl Brincat, Chris J. Mitchell: Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. IMA Int. Conf. 2001: 63-72
44 Niklas Borselius, Chris J. Mitchell, Aaron Wilson: On Mobile Agent Based Transactions in Moderately Hostile Environments. Network Security 2001: 173-186
43EELars R. Knudsen, Chris J. Mitchell: An analysis of the 3gpp-MAC scheme. Electronic Notes in Discrete Mathematics 6: 346-355 (2001)
2000
42EEDon Coppersmith, Lars R. Knudsen, Chris J. Mitchell: Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. CRYPTO 2000: 184-196
41 Chris J. Mitchell: Making serial number based authentication robust against loss of state. Operating Systems Review 34(3): 56-59 (2000)
1998
40EEPeter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166
39EEKeith M. Martin, Bart Preneel, Chris J. Mitchell, Hans-Joachim Hitz, Günther Horn, A. Poliakova, P. Howard: Secure Billing for Mobile Information Services in UMTS. IS&N 1998: 535-548
38 Chris J. Mitchell: On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes. IEEE Transactions on Information Theory 44(7): 3146-3150 (1998)
37 Chris J. Mitchell, Chan Yeob Yeun: Fixing a Problem in the Helsinki Protocol. Operating Systems Review 32(4): 21-24 (1998)
36EEChris J. Mitchell, Kenneth G. Paterson: Perfect Factors from Cyclic Codes and Interleaving. SIAM J. Discrete Math. 11(2): 241-264 (1998)
1997
35 Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193
34 Liqun Chen, Chris J. Mitchell: An anonymous and undeniable payment scheme. ICICS 1997: 478-482
33EEMark P. Hoyle, Chris J. Mitchell: On Solutions to the Key Escrow Problem. State of the Art in Applied Cryptography 1997: 277-306
32 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Authentication Using Minimally Trusted Servers. Operating Systems Review 31(3): 16-28 (1997)
31EEChris J. Mitchell: De Bruijn Sequences and Perfect Factors. SIAM J. Discrete Math. 10(2): 270-281 (1997)
1996
30 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133
29 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153
28 Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild: Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. Des. Codes Cryptography 7(1-2): 101-110 (1996)
27 Dieter Gollmann, Yongfei Han, Chris J. Mitchell: Redundant Integer Representations and Fast Exponentiation. Des. Codes Cryptography 7(1-2): 135-151 (1996)
26 Chris J. Mitchell, Tuvi Etzion, Kenneth G. Paterson: A method for constructing decodable de Bruijn sequences. IEEE Transactions on Information Theory 42(5): 1472-1478 (1996)
25EEGlenn Hurlbert, Chris J. Mitchell, Kenneth G. Paterson: On the Existence of de Bruijn Tori with Two by Two Windows. J. Comb. Theory, Ser. A 76(2): 213-230 (1996)
24 Chris J. Mitchell, Liqun Chen: Comments on the S/KEY User Authentication Scheme. Operating Systems Review 30(4): 12-16 (1996)
1995
23EELiqun Chen, Dieter Gollmann, Chris J. Mitchell: Key distribution without individual trusted authentification servers. CSFW 1995: 30-
22 Nigel Jefferies, Chris J. Mitchell, Michael Walker: A Proposed Architecture for Trusted Third Party Services. Cryptography: Policy and Algorithms 1995: 98-104
21 Yongfei Han, Dieter Gollmann, Chris J. Mitchell: Minimal Weight k-SR Representations. IMA Conf. 1995: 34-43
20 Chris J. Mitchell: A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels. IMA Conf. 1995: 84-93
19 Chris J. Mitchell: Aperiodic and semi-periodic perfect maps. IEEE Transactions on Information Theory 41(1): 88-95 (1995)
18 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Distributing Trust Amongst Multiple Authentication Servers. Journal of Computer Security 3(4): 255-268 (1995)
1994
17 Chris J. Mitchell, Kenneth G. Paterson: Decoding Perfect Maps. Des. Codes Cryptography 4(1): 11-30 (1994)
16 Chris J. Mitchell: Constructing c-ary Perfect Factors. Des. Codes Cryptography 4(4): 341-368 (1994)
15EEJonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild: Perfect binary arrays and difference sets. Discrete Mathematics 125(1-3): 241-254 (1994)
14 John Burns, Chris J. Mitchell: Parameter Selection for Server-Aided RSA Computation Schemes. IEEE Trans. Computers 43(2): 163-174 (1994)
13EEChris J. Mitchell, Michael Walker, Peter R. Wild: The Combinatorics of Perfect Authentication Schemes. SIAM J. Discrete Math. 7(1): 102-107 (1994)
1993
12 Chris J. Mitchell, A. Thomas: Standardising Authentication Protocols Based on Public-Key Techniques. Journal of Computer Security 2: 23-36 (1993)
1992
11 Chris J. Mitchell: Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure. IEEE Trans. Computers 41(4): 505-507 (1992)
1991
10EEChris J. Mitchell, Vijay Varadharajan: Modified forms of cipher block chaining. Computers & Security 10(1): 37-40 (1991)
1990
9 Chris J. Mitchell, Dave Rush, Michael Walker: A Secure Messaging Architecture Implementing the X.400-1988 Security Features. Comput. J. 33(4): 290-295 (1990)
8EEJohn Burns, Chris J. Mitchell: A security scheme for resource sharing over a network. Computers & Security 9(1): 67-75 (1990)
7 Chris J. Mitchell: Enumerating Boolean Functions of Cryptographic Significance. J. Cryptology 2(3): 155-170 (1990)
6 Philippe Godlewski, Chris J. Mitchell: Key-Minimal Crytosystems for Unconditional Secrecy. J. Cryptology 3(1): 1-25 (1990)
1989
5EEPhilippe Godlewski, Chris J. Mitchell: Key Minimal Authentication Systems for Unconditional Secrecy. EUROCRYPT 1989: 497-501
4 Chris J. Mitchell: Multi-Destination Secure Electronic Mail. Comput. J. 32(1): 13-15 (1989)
3 Chris J. Mitchell: Another Postage Stamp Problem. Comput. J. 32(4): 374-376 (1989)
2EEChris J. Mitchell, Dave Rush, Michael Walker: A remark on hash functions for message authentication. Computers & Security 8(1): 55-58 (1989)
1988
1EEChris J. Mitchell, Fred Piper: Key storage in secure networks. Discrete Applied Mathematics 21(3): 215-228 (1988)

Coauthor Index

1Imad M. Abbadi [100]
2Mansour A. Al-Meaither [66]
3Sattam S. Al-Riyami [57]
4Waleed A. Alrodhan [101] [107]
5Adil Alsaid [74] [79] [89]
6Suranjith Ariyapperuma [103]
7Shane Balfe [104]
8Côme Berbain [87]
9Angelos Bilas [110]
10Niklas Borselius [44] [47] [50] [51] [62]
11Karl Brincat [45] [49]
12John Burns [8] [14]
13Liqun Chen [18] [23] [24] [29] [30] [32] [34] [35] [106] [111]
14Gary Clemo [80]
15Don Coppersmith [42]
16Nicolas Courtois [87]
17Blandine Debraize [87]
18Tuvi Etzion [26]
19Anand S. Gajparia [75]
20Eimear Gallery [102] [104] [109]
21Philippe Godlewski [5] [6]
22Dieter Gollmann [18] [21] [23] [27] [29] [30] [32] [35] [40]
23Li Gong [40]
24Aline Gouget [87]
25Yongfei Han [21] [27]
26Hans-Joachim Hitz [39]
27Jaap-Henk Hoepman [110]
28Günther Horn [39]
29P. Howard [39]
30Mark P. Hoyle [33]
31Shenglan Hu [82]
32Namhyun Hur [58]
33Glenn H. Hurlbert (Glenn Hurlbert) [25]
34Pita Jarupunphol [53] [55]
35Jonathan Jedwab [15]
36Nigel Jefferies [22]
37Georgios Kalogridis [80] [108]
38Günter Karjoth [40]
39Vorapranee Khu-smith [48] [52] [56] [65]
40Lars R. Knudsen [42] [43] [60] [73]
41Adrian Leung [96] [98] [106]
42John A. MacDonald [81]
43Olivier Markowitch [110]
44Andrew Martin [111]
45Keith M. Martin [39]
46Sharon Nachtigal [95]
47Paulo S. Pagliusi [54] [61]
48Andreas Pashalidis [63] [68] [69] [71] [72]
49Kenneth G. Paterson [17] [25] [26] [36] [86] [104]
50Fred Piper [1] [15] [28] [97]
51A. Poliakova [39]
52Bart Preneel [39]
53Geraint Price [88]
54Jean-Jacques Quisquater [110]
55Konstantinos Rantos [46] [76]
56Luciano Rila [59] [67]
57Dave Rush [2] [9]
58Peter Y. A. Ryan (Peter Ryan) [40]
59Hervé Sibert [87]
60William G. Sirett [81]
61Boyeon Song [105]
62Qiang Tang [77] [78] [85] [90] [91] [94]
63A. Thomas [12]
64Vijay Varadharajan [10]
65Michael Walker [2] [9] [13] [22] [28]
66Peter R. Wild [13] [15] [28] [35] [97]
67Aaron Wilson [44] [47] [50] [51]
68Arnold K. L. Yau [86]
69Chan Yeob Yeun [37] [75]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)