Chris J. Mitchell
Orcid: 0000-0002-6118-0055Affiliations:
- Royal Holloway, University of London, UK
According to our database1,
Chris J. Mitchell
authored at least 193 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
2023
Comput. J., June, 2023
2022
2021
J. Inf. Secur. Appl., 2021
How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes.
IET Inf. Secur., 2021
CoRR, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Trust, Privacy and Security in Digital Business, 2021
2020
Provably insecure group authentication: Not all security proofs are what they claim to be.
CoRR, 2020
How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure.
CoRR, 2020
Comput. Secur., 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
2019
CoRR, 2019
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019
2018
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018
2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
2015
Proceedings of the Security Standardisation Research - Second International Conference, 2015
Proceedings of the Security Standardisation Research - Second International Conference, 2015
Proceedings of the ISSE 2015, 2015
2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Secur. Commun. Networks, 2013
Mob. Networks Appl., 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Generating certification authority authenticated public keys in <i>ad hoc</i> networks.
Secur. Commun. Networks, 2012
Proceedings of the Security and Privacy in Communication Networks, 2012
2011
Comput. Commun., 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the Computer and Information Sciences II, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Public Key Infrastructures, Services and Applications, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
2010
Int. J. Electron. Secur. Digit. Forensics, 2010
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010
Proceedings of the Policies and Research in Identity Management, 2010
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010
2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the Trusted Computing, 2008
Proceedings of the IDtrust 2008, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Cryptography and Coding, 2007
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments.
Proceedings of the UbiComp 2007: Ubiquitous Computing, 9th International Conference, 2007
Proceedings of the Foundations of Security Analysis and Design IV, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the The Second International Conference on Availability, 2007
Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007
2006
J. Syst. Softw., 2006
Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen).
it Inf. Technol., 2006
Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries.
Proceedings of the Security Protocols, 2006
Modelling E-Business Security Using Business Processes.
Proceedings of the SECRYPT 2006, 2006
A Service Discovery Threat Model for Ad Hoc Networks.
Proceedings of the SECRYPT 2006, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme.
IACR Cryptol. ePrint Arch., 2005
Comput. Stand. Interfaces, 2005
Overcoming Channel Bandwidth Constraints in Secure SIM Applications.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the Public Key Infrastructure, 2005
Spy Agents: Evaluating Trust in Remote Environments.
Proceedings of The 2005 International Conference on Security and Management, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Comments on mutual authentication and key exchange protocols for low power wireless communications.
IEEE Commun. Lett., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Security Protocols, 2004
Proceedings of the Security Protocols, 2004
Proceedings of the Information Security Management, Education and Privacy, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the Public Key Infrastructure, 2004
2003
Appl. Math. Comput., 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Cryptography and Coding, 2003
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
Securing FIPA Agent Communication.
Proceedings of the International Conference on Security and Management, 2003
Proceedings of the 16th Bled eConference: eTransformation, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
IEEE Trans. Veh. Technol., 2002
ACM SIGOPS Oper. Syst. Rev., 2002
Proceedings of the 2nd International Workshop on Mobile Commerce, 2002
E-commerce and the Media - Influences on Security Risk Perceptions.
Proceedings of the Internet Technologies, 2002
Implementation Aspects of SET/EMV.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002
Proceedings of the Advanced Communications and Multimedia Security, 2002
Proceedings of the Advanced Communications and Multimedia Security, 2002
Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002
2001
Proceedings of the Advances in Network and Distributed Systems Security, 2001
Proceedings of the Cryptography and Coding, 2001
Proceedings of the Cryptography and Coding, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
ACM SIGOPS Oper. Syst. Rev., 2000
Proceedings of the Advances in Cryptology, 2000
1999
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1999
1998
IEEE Trans. Inf. Theory, 1998
Proceedings of the Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
1997
Int. J. Comput. Math., 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
Proceedings of the State of the Art in Applied Cryptography, 1997
1996
IEEE Trans. Inf. Theory, 1996
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes.
Des. Codes Cryptogr., 1996
Des. Codes Cryptogr., 1996
Proceedings of the Security Protocols, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels.
Proceedings of the Cryptography and Coding, 1995
Proceedings of the Cryptography and Coding, 1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
1994
IEEE Trans. Computers, 1994
1993
Standardising Authentication Protocols Based on Public-Key Techniques.
J. Comput. Secur., 1993
1992
Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure.
IEEE Trans. Computers, 1992
1991
1990
Comput. J., 1990
Security defects in CCITT recommendation X.509: the directory authentication framework.
Comput. Commun. Rev., 1990
1989
Proceedings of the Advances in Cryptology, 1989
1988
Comput. Secur., 1988
1987
Comput. Secur., 1987