Chris J. Mitchell

Orcid: 0000-0002-6118-0055

Affiliations:
  • Royal Holloway, University of London, UK


According to our database1, Chris J. Mitchell authored at least 193 papers between 1987 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

1990
1995
2000
2005
2010
2015
2020
0
5
10
15
20
25
3
1
1
4
5
2
4
3
2
1
1
1
2
1
1
2
13
2
2
3
1
2
2
3
4
6
2
5
1
1
1
5
4
2
1
2
2
1
4
2
3
3
2
1
1
6
3
2
5
6
3
12
5
9
8
6
1
2
3
2
4
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AI-Enhanced Ethical Hacking: A Linux-Focused Experiment.
CoRR, 2024

Orientable and negative orientable sequences.
CoRR, 2024

Integrity-protecting block cipher modes - Untangling a tangled web.
CoRR, 2024

2023
Special Issue on Failed Approaches and Insightful Losses in Cryptology - Foreword.
Comput. J., June, 2023

2022
Constructing Orientable Sequences.
IEEE Trans. Inf. Theory, 2022

2021
Yet another insecure group key distribution scheme using secret sharing.
J. Inf. Secur. Appl., 2021

How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes.
IET Inf. Secur., 2021

Guest Editorial: Security and Privacy.
IEEE Commun. Stand. Mag., 2021

The (in)security of some recently proposed lightweight key distribution schemes.
CoRR, 2021

Privacy-Preserving Biometric Matching Using Homomorphic Encryption.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Automating the Evaluation of Trustworthiness.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

2020
An insecure noninteractive group key establishment scheme.
CoRR, 2020

Provably insecure group authentication: Not all security proofs are what they claim to be.
CoRR, 2020

How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure.
CoRR, 2020

Who Needs Trust for 5G?
CoRR, 2020

The impact of quantum computing on real-world security: A 5G case study.
Comput. Secur., 2020

User Access Privacy in OAuth 2.0 and OpenID Connect.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Post-quantum Certificates for Electronic Travel Documents.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure.
CoRR, 2019

Security issues in a group key establishment protocol.
Comput. J., 2019

OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect.
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019

2018
Message from the Guest Editors.
Int. J. Inf. Sec., 2018

The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure.
CoRR, 2018

Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect.
CoRR, 2018

Web password recovery - a necessary evil?
CoRR, 2018

Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations.
Proceedings of the Security Protocols XXVI, 2018

Mitigating CSRF attacks on OAuth 2.0 Systems.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking.
Proceedings of the Information Security - 21st International Conference, 2018

Email-based Password Recovery - Risking or Rescuing Users?
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

2017
Trashing IMSI catchers in mobile networks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

AutoPass: An automatic password generator.
Proceedings of the International Carnahan Conference on Security Technology, 2017

2016
On the Security of 2-Key Triple DES.
IEEE Trans. Inf. Theory, 2016

Message from the guest editors.
Int. J. Inf. Sec., 2016

Editorial for the 25th anniversary issue.
Des. Codes Cryptogr., 2016

Password Generators: Old Ideas and New.
Proceedings of the Information Security Theory and Practice, 2016

Retrofitting Mutual Authentication to GSM Using RAND Hijacking.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Analysing the Security of Google's Implementation of OpenID Connect.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Improving Air Interface User Privacy in Mobile Telephony.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Generating Unlinkable IPv6 Addresses.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Addressing Threats to Real-World Identity Management Systems.
Proceedings of the ISSE 2015, 2015

2014
Security Issues in OAuth 2.0 SSO Implementations.
Proceedings of the Information Security - 17th International Conference, 2014

Another Look at Privacy Threats in 3G Mobile Telephony.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Enabling interoperation between Shibboleth and Information Card systems.
Secur. Commun. Networks, 2013

Ubiquitous One-Time Password Service Using the Generic Authentication Architecture.
Mob. Networks Appl., 2013

Analysing the IOBC Authenticated Encryption Mode.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Generating certification authority authenticated public keys in <i>ad hoc</i> networks.
Secur. Commun. Networks, 2012

Building General-Purpose Security Services on EMV Payment Cards.
Proceedings of the Security and Privacy in Communication Networks, 2012

2011
Scalable RFID security protocols supporting tag ownership transfer.
Comput. Commun., 2011

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Extending the Scope of cardspace.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Client-Based CardSpace-OpenID Interoperation.
Proceedings of the Computer and Information Sciences II, 2011

Building General Purpose Security Services on Trusted Computing.
Proceedings of the Trusted Systems - Third International Conference, 2011

A Universal Client-Based Identity Management Tool.
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

Enhancing CardSpace Authentication Using a Mobile Device.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
Parsing ambiguities in authentication and key establishment protocols.
Int. J. Electron. Secur. Digit. Forensics, 2010

CardSpace-liberty integration for CardSpace users.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

Using CardSpace as a Password Manager.
Proceedings of the Policies and Research in Identity Management, 2010

Enhancing user authentication in claim-based identity management.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

2009
Improving the Security of CardSpace.
EURASIP J. Inf. Secur., 2009

Trusted Computing: Security and Applications.
Cryptologia, 2009

A Novel Stateless Authentication Protocol.
Proceedings of the Security Protocols XVII, 2009

Scalable RFID Pseudonym Protocol.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
Challenges for Trusted Computing.
IEEE Secur. Priv., 2008

RFID authentication protocol for low-cost tags.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA).
Proceedings of the Trusted Computing, 2008

A client-side CardSpace-Liberty integration architecture.
Proceedings of the IDtrust 2008, 2008

A Device Management Framework for Secure Ubiquitous Service Delivery.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

Using Non-adaptive Group Testing to Construct Spy Agent Routes.
Proceedings of the The Third International Conference on Availability, 2008

2007
ID-based cryptography using symmetric primitives.
Des. Codes Cryptogr., 2007

Cryptanalysis of the EPBC Authenticated Encryption Mode.
Proceedings of the Cryptography and Coding, 2007

Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments.
Proceedings of the UbiComp 2007: Ubiquitous Computing, 9th International Conference, 2007

Trusted Mobile Platforms.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Addressing privacy issues in CardSpace.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Security vulnerabilities in DNS and DNSSEC.
Proceedings of the The Second International Conference on Availability, 2007

Digital rights management using a mobile phone.
Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007

2006
Cryptanalysis of a hybrid authentication protocol for large mobile networks.
J. Syst. Softw., 2006

Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen).
it Inf. Technol., 2006

Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries.
Proceedings of the Security Protocols, 2006

Modelling E-Business Security Using Business Processes.
Proceedings of the SECRYPT 2006, 2006

A Service Discovery Threat Model for Ad Hoc Networks.
Proceedings of the SECRYPT 2006, 2006

2005
Partial Key Recovery Attack Against RMAC.
J. Cryptol., 2005

Dynamic content attacks on digital signatures.
Inf. Manag. Comput. Security, 2005

Supporting User Privacy in Location Based Services.
IEICE Trans. Commun., 2005

Efficient Compilers for Authenticated Group Key Exchange.
IACR Cryptol. ePrint Arch., 2005

Security properties of two provably secure conference key agreement protocols.
IACR Cryptol. ePrint Arch., 2005

Weaknesses in a leakage-resilient authenticated key transport protocol.
IACR Cryptol. ePrint Arch., 2005

On the security of some password-based key agreement schemes.
IACR Cryptol. ePrint Arch., 2005

Enhanced password-based key establishment protocol.
IACR Cryptol. ePrint Arch., 2005

Cryptanalysis of two identification schemes based on an ID-based cryptosystem.
IACR Cryptol. ePrint Arch., 2005

Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme.
IACR Cryptol. ePrint Arch., 2005

Comments on two anonymous conference key distribution systems.
Comput. Stand. Interfaces, 2005

Comments on a cryptographic key assignment scheme.
Comput. Stand. Interfaces, 2005

Matching key recovery mechanisms to business requirements.
Comput. Secur., 2005

A Scanning Tool for PC Root Public Key Stores.
Proceedings of the WEWoRC 2005, 2005

Overcoming Channel Bandwidth Constraints in Secure SIM Applications.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?
Proceedings of the Information Security, 8th International Conference, 2005

Partial Key Recovery Attacks on XCBC, TMAC and OMAC.
Proceedings of the Cryptography and Coding, 2005

Security Properties of Two Authenticated Conference Key Agreement Protocols.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Analysis of the Bit-Search Generator and Sequence Compression Techniques.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Interoperation Between a Conventional PKI and an ID-Based Infrastructure.
Proceedings of the Public Key Infrastructure, 2005

Installing Fake Root Keys in a PC.
Proceedings of the Public Key Infrastructure, 2005

Spy Agents: Evaluating Trust in Remote Environments.
Proceedings of The 2005 International Conference on Security and Management, 2005

Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Comments on mutual authentication and key exchange protocols for low power wireless communications.
IEEE Commun. Lett., 2004

Rethinking the security of some authenticated group key agreement schemes.
IACR Cryptol. ePrint Arch., 2004

Limits to Anonymity When Using Credentials.
Proceedings of the Security Protocols, 2004

Limits to Anonymity When Using Credentials (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

A Security Model for Anonymous Credential Systems.
Proceedings of the Information Security Management, Education and Privacy, 2004

Impostor: a single sign-on system for use from untrusted devices.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Using EMV Cards for Single Sign-On.
Proceedings of the Public Key Infrastructure, 2004

2003
Analysis of 3gpp-MAC and Two-key 3gpp-MAC.
Discret. Appl. Math., 2003

Improvement of modified authenticated key agreement protocol.
Appl. Math. Comput., 2003

PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Single Sign-On Using Trusted Platforms.
Proceedings of the Information Security, 6th International Conference, 2003

Remote User Authentication Using Public Information.
Proceedings of the Cryptography and Coding, 2003

Enhancing E-commerce Security Using GSM Authentication.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

A Secure Electronic Payment Scheme for Charity Donations.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

Securing FIPA Agent Communication.
Proceedings of the International Conference on Security and Management, 2003

A Secure Electronic Murabaha Transaction.
Proceedings of the 16th Bled eConference: eTransformation, 2003

Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards.
Proceedings of the Applied Cryptography and Network Security, 2003

A Taxonomy of Single Sign-On Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Authentication protocols for mobile network environment value-added services.
IEEE Trans. Veh. Technol., 2002

On the value of threshold signatures.
ACM SIGOPS Oper. Syst. Rev., 2002

A pragmatic alternative to undetachable signatures.
ACM SIGOPS Oper. Syst. Rev., 2002

Using GSM to enhance e-commerce security.
Proceedings of the 2nd International Workshop on Mobile Commerce, 2002

E-commerce and the Media - Influences on Security Risk Perceptions.
Proceedings of the Internet Technologies, 2002

Is Entity Authentication Necessary?
Proceedings of the Security Protocols, 2002

Implementation Aspects of SET/EMV.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002

Using EMV Cards to Protect E-commerce Transactions.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

On the security of a structural proven signer ordering multisignature scheme.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Renewing crytographic timestamps.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

2001
An analysis of the 3gpp-MAC scheme.
Electron. Notes Discret. Math., 2001

On Mobile Agent Based Transactions in Moderately Hostile Environments.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation.
Proceedings of the Cryptography and Coding, 2001

Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs.
Proceedings of the Cryptography and Coding, 2001

Undetachable Threshold Signatures.
Proceedings of the Cryptography and Coding, 2001

Enhancing the Security of Cookies.
Proceedings of the Information Security and Cryptology, 2001

New CBC-MAC Forgery Attacks.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Making serial number based authentication robust against loss of state.
ACM SIGOPS Oper. Syst. Rev., 2000

PKI standards.
Inf. Secur. Tech. Rep., 2000

Key Recovery and Forgery Attacks on the MacDES MAC Algorithm.
Proceedings of the Advances in Cryptology, 2000

1999
Comments on an optimized protocol for mobile network authentication and security.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1999

A fair certification protocol.
Comput. Commun. Rev., 1999

1998
On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes.
IEEE Trans. Inf. Theory, 1998

Fixing a Problem in the Helsinki Protocol.
ACM SIGOPS Oper. Syst. Rev., 1998

Perfect Factors from Cyclic Codes and Interleaving.
SIAM J. Discret. Math., 1998

Secure Billing for Mobile Information Services in UMTS.
Proceedings of the Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 1998

Panel Introduction: The Security Impact of Distributed Computing Technologies.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
Authentication Using Minimally Trusted Servers.
ACM SIGOPS Oper. Syst. Rev., 1997

De Bruijn Sequences and Perfect Factors.
SIAM J. Discret. Math., 1997

Authentication using cryptography.
Inf. Secur. Tech. Rep., 1997

A fast modular exponentiation for rsa on systolic arrays.
Int. J. Comput. Math., 1997

An anonymous and undeniable payment scheme.
Proceedings of the Information and Communication Security, First International Conference, 1997

Secret Sharing with Reusable Polynomials.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

On Solutions to the Key Escrow Problem.
Proceedings of the State of the Art in Applied Cryptography, 1997

1996
A method for constructing decodable de Bruijn sequences.
IEEE Trans. Inf. Theory, 1996

Comments on the S/KEY User Authentication Scheme.
ACM SIGOPS Oper. Syst. Rev., 1996

On the Existence of de Bruijn Tori with Two by Two Windows.
J. Comb. Theory A, 1996

The royal holloway TTP-based key escrow scheme.
Inf. Secur. Tech. Rep., 1996

Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes.
Des. Codes Cryptogr., 1996

Redundant Integer Representations and Fast Exponentiation.
Des. Codes Cryptogr., 1996

Key Escrow in Mutually Mistrusting Domains.
Proceedings of the Security Protocols, 1996

Tailoring authentication protocols to match underlying mechanisms.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
Aperiodic and semi-periodic perfect maps.
IEEE Trans. Inf. Theory, 1995

Distributing Trust Amongst Multiple Authentication Servers.
J. Comput. Secur., 1995

A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels.
Proceedings of the Cryptography and Coding, 1995

Minimal Weight k-SR Representations.
Proceedings of the Cryptography and Coding, 1995

Key distribution without individual trusted authentification servers.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

A Proposed Architecture for Trusted Third Party Services.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
Parameter Selection for Server-Aided RSA Computation Schemes.
IEEE Trans. Computers, 1994

The Combinatorics of Perfect Authentication Schemes.
SIAM J. Discret. Math., 1994

Perfect binary arrays and difference sets.
Discret. Math., 1994

Decoding Perfect Maps.
Des. Codes Cryptogr., 1994

Constructing c-ary Perfect Factors.
Des. Codes Cryptogr., 1994

1993
Standardising Authentication Protocols Based on Public-Key Techniques.
J. Comput. Secur., 1993

1992
Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure.
IEEE Trans. Computers, 1992

1991
Modified forms of cipher block chaining.
Comput. Secur., 1991

1990
Enumerating Boolean Functions of Cryptographic Significance.
J. Cryptol., 1990

Key-Minimal Crytosystems for Unconditional Secrecy.
J. Cryptol., 1990

A security scheme for resource sharing over a network.
Comput. Secur., 1990

A Secure Messaging Architecture Implementing the X.400-1988 Security Features.
Comput. J., 1990

Security defects in CCITT recommendation X.509: the directory authentication framework.
Comput. Commun. Rev., 1990

1989
One-stage one-sided rearrangeable switching networks.
IEEE Trans. Commun., 1989

A remark on hash functions for message authentication.
Comput. Secur., 1989

Another Postage Stamp Problem.
Comput. J., 1989

Multi-Destination Secure Electronic Mail.
Comput. J., 1989

Key Minimal Authentication Systems for Unconditional Secrecy.
Proceedings of the Advances in Cryptology, 1989

1988
Key storage in secure networks.
Discret. Appl. Math., 1988

Solutions to the multidestination secure electronic mail problem.
Comput. Secur., 1988

1987
The cost of reducing key-storage requirements in secure networks.
Comput. Secur., 1987


  Loading...