BibTeX records: Chris J. Mitchell

download as .bib file

@article{DBLP:journals/corr/abs-2403-03654,
  author       = {Chris J. Mitchell},
  title        = {Integrity-protecting block cipher modes - Untangling a tangled web},
  journal      = {CoRR},
  volume       = {abs/2403.03654},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.03654},
  doi          = {10.48550/ARXIV.2403.03654},
  eprinttype    = {arXiv},
  eprint       = {2403.03654},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-03654.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/AshurM23,
  author       = {Tomer Ashur and
                  Chris J. Mitchell},
  title        = {Special Issue on Failed Approaches and Insightful Losses in Cryptology
                  - Foreword},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {6},
  pages        = {1311},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxac191},
  doi          = {10.1093/COMJNL/BXAC191},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/AshurM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MitchellW22,
  author       = {Chris J. Mitchell and
                  Peter R. Wild},
  title        = {Constructing Orientable Sequences},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {68},
  number       = {7},
  pages        = {4782--4789},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIT.2022.3158645},
  doi          = {10.1109/TIT.2022.3158645},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/MitchellW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csm/MehrnezhadMM21,
  author       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Chris J. Mitchell},
  title        = {Guest Editorial: Security and Privacy},
  journal      = {{IEEE} Commun. Stand. Mag.},
  volume       = {5},
  number       = {3},
  pages        = {10--11},
  year         = {2021},
  url          = {https://doi.org/10.1109/MCOMSTD.2021.9579395},
  doi          = {10.1109/MCOMSTD.2021.9579395},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csm/MehrnezhadMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Mitchell21,
  author       = {Chris J. Mitchell},
  title        = {How not to secure wireless sensor networks: a plethora of insecure
                  polynomial-based key pre-distribution schemes},
  journal      = {{IET} Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {223--230},
  year         = {2021},
  url          = {https://doi.org/10.1049/ise2.12016},
  doi          = {10.1049/ISE2.12016},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Mitchell21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mitchell21,
  author       = {Chris J. Mitchell},
  title        = {Yet another insecure group key distribution scheme using secret sharing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102713},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102713},
  doi          = {10.1016/J.JISA.2020.102713},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Mitchell21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/SelM21,
  author       = {Marc Sel and
                  Chris J. Mitchell},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Automating the Evaluation of Trustworthiness},
  booktitle    = {Trust, Privacy and Security in Digital Business - 18th International
                  Conference, TrustBus 2021, Virtual Event, September 27-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12927},
  pages        = {18--31},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86586-3\_2},
  doi          = {10.1007/978-3-030-86586-3\_2},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/SelM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PradelM21,
  author       = {Ga{\"{e}}tan Pradel and
                  Chris J. Mitchell},
  title        = {Privacy-Preserving Biometric Matching Using Homomorphic Encryption},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {494--505},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00079},
  doi          = {10.1109/TRUSTCOM53373.2021.00079},
  timestamp    = {Sun, 13 Mar 2022 10:52:35 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PradelM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2021cysarm,
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Thanassis Giannetsos and
                  Daniele Sgandurra},
  title        = {CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security
                  Arms Race, Virtual Event, Republic of Korea, 19 November 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474374},
  doi          = {10.1145/3474374},
  isbn         = {978-1-4503-8661-6},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2021cysarm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-08132,
  author       = {Chris J. Mitchell},
  title        = {The (in)security of some recently proposed lightweight key distribution
                  schemes},
  journal      = {CoRR},
  volume       = {abs/2101.08132},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.08132},
  eprinttype    = {arXiv},
  eprint       = {2101.08132},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-08132.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-12372,
  author       = {Ga{\"{e}}tan Pradel and
                  Chris J. Mitchell},
  title        = {Privacy-Preserving Biometric Matching Using Homomorphic Encryption},
  journal      = {CoRR},
  volume       = {abs/2111.12372},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.12372},
  eprinttype    = {arXiv},
  eprint       = {2111.12372},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-12372.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Mitchell20,
  author       = {Chris J. Mitchell},
  title        = {The impact of quantum computing on real-world security: {A} 5G case
                  study},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101825},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101825},
  doi          = {10.1016/J.COSE.2020.101825},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Mitchell20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PradelM20,
  author       = {Ga{\"{e}}tan Pradel and
                  Chris J. Mitchell},
  editor       = {Ioana Boureanu and
                  Constantin Catalin Dragan and
                  Mark Manulis and
                  Thanassis Giannetsos and
                  Christoforos Dadoyan and
                  Panagiotis Gouvas and
                  Roger A. Hallman and
                  Shujun Li and
                  Victor Chang and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse},
  title        = {Post-quantum Certificates for Electronic Travel Documents},
  booktitle    = {Computer Security - {ESORICS} 2020 International Workshops, DETIPS,
                  DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12580},
  pages        = {56--73},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66504-3\_4},
  doi          = {10.1007/978-3-030-66504-3\_4},
  timestamp    = {Sun, 10 Dec 2023 06:07:27 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/PradelM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/LiM20,
  author       = {Wanpeng Li and
                  Chris J. Mitchell},
  title        = {User Access Privacy in OAuth 2.0 and OpenID Connect},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {664--672},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00095},
  doi          = {10.1109/EUROSPW51379.2020.00095},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/LiM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020cysarm,
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Thanassis Giannetsos and
                  Daniele Sgandurra},
  title        = {CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security
                  Arms Race, Virtual Event, USA, November, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411505},
  doi          = {10.1145/3411505},
  isbn         = {978-1-4503-8091-1},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2020cysarm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2020,
  editor       = {Thyla van der Merwe and
                  Chris J. Mitchell and
                  Maryam Mehrnezhad},
  title        = {Security Standardisation Research - 6th International Conference,
                  {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12529},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64357-7},
  doi          = {10.1007/978-3-030-64357-7},
  isbn         = {978-3-030-64356-0},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-14356,
  author       = {Chris J. Mitchell},
  title        = {Yet another insecure group key distribution scheme using secret sharing},
  journal      = {CoRR},
  volume       = {abs/2003.14356},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.14356},
  eprinttype    = {arXiv},
  eprint       = {2003.14356},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-14356.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-05597,
  author       = {Chris J. Mitchell},
  title        = {How not to secure wireless sensor networks: {A} plethora of insecure
                  polynomial-based key pre-distribution schemes},
  journal      = {CoRR},
  volume       = {abs/2004.05597},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.05597},
  eprinttype    = {arXiv},
  eprint       = {2004.05597},
  timestamp    = {Tue, 28 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-05597.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-00862,
  author       = {Chris J. Mitchell},
  title        = {Who Needs Trust for 5G?},
  journal      = {CoRR},
  volume       = {abs/2005.00862},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.00862},
  eprinttype    = {arXiv},
  eprint       = {2005.00862},
  timestamp    = {Fri, 08 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-00862.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-04434,
  author       = {Chris J. Mitchell},
  title        = {How not to secure wireless sensor networks revisited: Even if you
                  say it twice it's still not secure},
  journal      = {CoRR},
  volume       = {abs/2005.04434},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.04434},
  eprinttype    = {arXiv},
  eprint       = {2005.04434},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-04434.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-05376,
  author       = {Chris J. Mitchell},
  title        = {Provably insecure group authentication: Not all security proofs are
                  what they claim to be},
  journal      = {CoRR},
  volume       = {abs/2005.05376},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.05376},
  eprinttype    = {arXiv},
  eprint       = {2005.05376},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-05376.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-09278,
  author       = {Chris J. Mitchell},
  title        = {An insecure noninteractive group key establishment scheme},
  journal      = {CoRR},
  volume       = {abs/2009.09278},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.09278},
  eprinttype    = {arXiv},
  eprint       = {2009.09278},
  timestamp    = {Wed, 23 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-09278.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Mitchell19,
  author       = {Chris J. Mitchell},
  title        = {Security issues in a group key establishment protocol},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {3},
  pages        = {373--376},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxy058},
  doi          = {10.1093/COMJNL/BXY058},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Mitchell19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/LiMC19,
  author       = {Wanpeng Li and
                  Chris J. Mitchell and
                  Thomas M. Chen},
  editor       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Feng Hao},
  title        = {OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and
                  OpenID Connect},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
                  Research Workshop, London, UK, November 11, 2019},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338500.3360331},
  doi          = {10.1145/3338500.3360331},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/LiMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019cysarm,
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Thanassis Giannetsos and
                  Daniele Sgandurra},
  title        = {Proceedings of the 1st {ACM} Workshop on Workshop on Cyber-Security
                  Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338511},
  doi          = {10.1145/3338511},
  isbn         = {978-1-4503-6840-7},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2019cysarm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-08960,
  author       = {Wanpeng Li and
                  Chris J. Mitchell and
                  Thomas M. Chen},
  title        = {OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and
                  OpenID Connect},
  journal      = {CoRR},
  volume       = {abs/1901.08960},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.08960},
  eprinttype    = {arXiv},
  eprint       = {1901.08960},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-08960.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-09581,
  author       = {Nasser Mohammed Al{-}Fannah and
                  Wanpeng Li and
                  Chris J. Mitchell},
  title        = {Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking},
  journal      = {CoRR},
  volume       = {abs/1905.09581},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.09581},
  eprinttype    = {arXiv},
  eprint       = {1905.09581},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-09581.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-09330,
  author       = {Chris J. Mitchell},
  title        = {The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is
                  insecure},
  journal      = {CoRR},
  volume       = {abs/1906.09330},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.09330},
  eprinttype    = {arXiv},
  eprint       = {1906.09330},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-09330.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-07583,
  author       = {Chris J. Mitchell},
  title        = {The impact of quantum computing on real-world security: {A} 5G case
                  study},
  journal      = {CoRR},
  volume       = {abs/1911.07583},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.07583},
  eprinttype    = {arXiv},
  eprint       = {1911.07583},
  timestamp    = {Mon, 02 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-07583.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChenHM18,
  author       = {Liqun Chen and
                  Jinguang Han and
                  Chris J. Mitchell},
  title        = {Message from the Guest Editors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {5},
  pages        = {491--492},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-018-0416-2},
  doi          = {10.1007/S10207-018-0416-2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChenHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/MaqbaliM18,
  author       = {Fatma Al Maqbali and
                  Chris J. Mitchell},
  title        = {Email-based Password Recovery - Risking or Rescuing Users?},
  booktitle    = {2018 International Carnahan Conference on Security Technology, {ICCST}
                  2018, Montreal, QC, Canada, October 22-25, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CCST.2018.8585576},
  doi          = {10.1109/CCST.2018.8585576},
  timestamp    = {Wed, 09 Mar 2022 16:39:53 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/MaqbaliM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Al-FannahLM18,
  author       = {Nasser Mohammed Al{-}Fannah and
                  Wanpeng Li and
                  Chris J. Mitchell},
  editor       = {Liqun Chen and
                  Mark Manulis and
                  Steve A. Schneider},
  title        = {Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking},
  booktitle    = {Information Security - 21st International Conference, {ISC} 2018,
                  Guildford, UK, September 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11060},
  pages        = {481--501},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99136-8\_26},
  doi          = {10.1007/978-3-319-99136-8\_26},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Al-FannahLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/LiMC18,
  author       = {Wanpeng Li and
                  Chris J. Mitchell and
                  Thomas M. Chen},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {Mitigating {CSRF} attacks on OAuth 2.0 Systems},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514180},
  doi          = {10.1109/PST.2018.8514180},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/LiMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LiMC18,
  author       = {Wanpeng Li and
                  Chris J. Mitchell and
                  Thomas M. Chen},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {24--41},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_3},
  doi          = {10.1007/978-3-030-03251-7\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LiMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-06730,
  author       = {Fatma Al Maqbali and
                  Chris J. Mitchell},
  title        = {Web password recovery - a necessary evil?},
  journal      = {CoRR},
  volume       = {abs/1801.06730},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.06730},
  eprinttype    = {arXiv},
  eprint       = {1801.06730},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-06730.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-07983,
  author       = {Wanpeng Li and
                  Chris J. Mitchell and
                  Thomas M. Chen},
  title        = {Mitigating {CSRF} attacks on OAuth 2.0 and OpenID Connect},
  journal      = {CoRR},
  volume       = {abs/1801.07983},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.07983},
  eprinttype    = {arXiv},
  eprint       = {1801.07983},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-07983.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-01137,
  author       = {Chris J. Mitchell},
  title        = {Security issues in a group key establishment protocol},
  journal      = {CoRR},
  volume       = {abs/1803.01137},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.01137},
  eprinttype    = {arXiv},
  eprint       = {1803.01137},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-01137.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-05365,
  author       = {Chris J. Mitchell},
  title        = {The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure},
  journal      = {CoRR},
  volume       = {abs/1803.05365},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.05365},
  eprinttype    = {arXiv},
  eprint       = {1803.05365},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-05365.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/MaqbaliM17,
  author       = {Fatma Al Maqbali and
                  Chris J. Mitchell},
  title        = {AutoPass: An automatic password generator},
  booktitle    = {International Carnahan Conference on Security Technology, {ICCST}
                  2017, Madrid, Spain, October 23-26, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CCST.2017.8167791},
  doi          = {10.1109/CCST.2017.8167791},
  timestamp    = {Wed, 09 Mar 2022 16:39:53 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/MaqbaliM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KhanM17,
  author       = {Mohammed Shafiul Alam Khan and
                  Chris J. Mitchell},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Trashing {IMSI} catchers in mobile networks},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {207--218},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098248},
  doi          = {10.1145/3098243.3098248},
  timestamp    = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KhanM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2017,
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7},
  doi          = {10.1007/978-3-319-68063-7},
  isbn         = {978-3-319-68062-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MaqbaliM17,
  author       = {Fatma Al Maqbali and
                  Chris J. Mitchell},
  title        = {AutoPass: An Automatic Password Generator},
  journal      = {CoRR},
  volume       = {abs/1703.01959},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.01959},
  eprinttype    = {arXiv},
  eprint       = {1703.01959},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MaqbaliM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JungnickelKMMW16,
  author       = {Dieter Jungnickel and
                  Jennifer D. Key and
                  Chris J. Mitchell and
                  Ronald C. Mullin and
                  Peter R. Wild},
  title        = {Editorial for the 25th anniversary issue},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {1--3},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0158-3},
  doi          = {10.1007/S10623-015-0158-3},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/JungnickelKMMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChenM16,
  author       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Message from the guest editors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {6},
  pages        = {573--574},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-016-0353-x},
  doi          = {10.1007/S10207-016-0353-X},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChenM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Mitchell16,
  author       = {Chris J. Mitchell},
  title        = {On the Security of 2-Key Triple {DES}},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {62},
  number       = {11},
  pages        = {6260--6267},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIT.2016.2611003},
  doi          = {10.1109/TIT.2016.2611003},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Mitchell16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/LiM16,
  author       = {Wanpeng Li and
                  Chris J. Mitchell},
  editor       = {Juan Caballero and
                  Urko Zurutuza and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Analysing the Security of Google's Implementation of OpenID Connect},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n,
                  Spain, July 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9721},
  pages        = {357--376},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40667-1\_18},
  doi          = {10.1007/978-3-319-40667-1\_18},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/LiM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KhanM16,
  author       = {Mohammed Shafiul Alam Khan and
                  Chris J. Mitchell},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Retrofitting Mutual Authentication to {GSM} Using {RAND} Hijacking},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_2},
  doi          = {10.1007/978-3-319-46598-2\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/KhanM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MaqbaliM16,
  author       = {Fatma Al Maqbali and
                  Chris J. Mitchell},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Password Generators: Old Ideas and New},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {245--253},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_16},
  doi          = {10.1007/978-3-319-45931-8\_16},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/MaqbaliM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2016,
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4},
  doi          = {10.1007/978-3-319-49100-4},
  isbn         = {978-3-319-49099-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Mitchell16,
  author       = {Chris J. Mitchell},
  title        = {On the security of 2-key triple {DES}},
  journal      = {CoRR},
  volume       = {abs/1602.06229},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.06229},
  eprinttype    = {arXiv},
  eprint       = {1602.06229},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Mitchell16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KhanM16,
  author       = {Mohammed Shafiul Alam Khan and
                  Chris J. Mitchell},
  title        = {Retrofitting mutual authentication to {GSM} using {RAND} hijacking},
  journal      = {CoRR},
  volume       = {abs/1607.00729},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.00729},
  eprinttype    = {arXiv},
  eprint       = {1607.00729},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KhanM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MaqbaliM16,
  author       = {Fatma Al Maqbali and
                  Chris J. Mitchell},
  title        = {Password Generators: Old Ideas and New},
  journal      = {CoRR},
  volume       = {abs/1607.04421},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.04421},
  eprinttype    = {arXiv},
  eprint       = {1607.04421},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MaqbaliM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/LiM15,
  author       = {Wanpeng Li and
                  Chris J. Mitchell},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Addressing Threats to Real-World Identity Management Systems},
  booktitle    = {{ISSE} 2015 - Highlights of the Information Security Solutions Europe
                  2015 Conference, Berlin, Germany, November 1-2, 2015},
  pages        = {251--259},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-658-10934-9\_21},
  doi          = {10.1007/978-3-658-10934-9\_21},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/LiM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KhanM15,
  author       = {Mohammed Shafiul Alam Khan and
                  Chris J. Mitchell},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Improving Air Interface User Privacy in Mobile Telephony},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {165--184},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_9},
  doi          = {10.1007/978-3-319-27152-1\_9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/KhanM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KayuniKLMY15,
  author       = {Mwawi Nyirenda Kayuni and
                  Mohammed Shafiul Alam Khan and
                  Wanpeng Li and
                  Chris J. Mitchell and
                  Po{-}Wah Yau},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Generating Unlinkable IPv6 Addresses},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {185--199},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_10},
  doi          = {10.1007/978-3-319-27152-1\_10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/KayuniKLMY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2015,
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5},
  doi          = {10.1007/978-3-319-23318-5},
  isbn         = {978-3-319-23317-8},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KhanM15,
  author       = {Mohammed Shafiul Alam Khan and
                  Chris J. Mitchell},
  title        = {Improving Air Interface User Privacy in Mobile Telephony},
  journal      = {CoRR},
  volume       = {abs/1504.03287},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.03287},
  eprinttype    = {arXiv},
  eprint       = {1504.03287},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KhanM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiM15,
  author       = {Wanpeng Li and
                  Chris J. Mitchell},
  title        = {Analysing the Security of Google's implementation of OpenID Connect},
  journal      = {CoRR},
  volume       = {abs/1508.01707},
  year         = {2015},
  url          = {http://arxiv.org/abs/1508.01707},
  eprinttype    = {arXiv},
  eprint       = {1508.01707},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KhanM14,
  author       = {Mohammed Shafiul Alam Khan and
                  Chris J. Mitchell},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Another Look at Privacy Threats in 3G Mobile Telephony},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {386--396},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_25},
  doi          = {10.1007/978-3-319-08344-5\_25},
  timestamp    = {Thu, 14 Oct 2021 10:41:30 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KhanM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LiM14,
  author       = {Wanpeng Li and
                  Chris J. Mitchell},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Security Issues in OAuth 2.0 {SSO} Implementations},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {529--541},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_34},
  doi          = {10.1007/978-3-319-13257-0\_34},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LiM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2014,
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4},
  doi          = {10.1007/978-3-319-14054-4},
  isbn         = {978-3-319-14053-7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/0002MT13,
  author       = {Chunhua Chen and
                  Chris J. Mitchell and
                  Shaohua Tang},
  title        = {Ubiquitous One-Time Password Service Using the Generic Authentication
                  Architecture},
  journal      = {Mob. Networks Appl.},
  volume       = {18},
  number       = {5},
  pages        = {738--747},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11036-011-0329-z},
  doi          = {10.1007/S11036-011-0329-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/0002MT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Al-SinaniM13,
  author       = {Haitham S. Al{-}Sinani and
                  Chris J. Mitchell},
  title        = {Enabling interoperation between Shibboleth and Information Card systems},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {2},
  pages        = {219--229},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.560},
  doi          = {10.1002/SEC.560},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Al-SinaniM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Mitchell13,
  author       = {Chris J. Mitchell},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Analysing the {IOBC} Authenticated Encryption Mode},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_1},
  doi          = {10.1007/978-3-642-39059-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Mitchell13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2012,
  editor       = {Sabrina De Capitani di Vimercati and
                  Chris J. Mitchell},
  title        = {Public Key Infrastructures, Services and Applications - 9th European
                  Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7868},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40012-4},
  doi          = {10.1007/978-3-642-40012-4},
  isbn         = {978-3-642-40011-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/idman/2013,
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Elisabeth de Leeuw and
                  Chris J. Mitchell},
  title        = {Policies and Research in Identity Management - Third {IFIP} {WG} 11.6
                  Working Conference, {IDMAN} 2013, London, UK, April 8-9, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {396},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37282-7},
  doi          = {10.1007/978-3-642-37282-7},
  isbn         = {978-3-642-37281-0},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idman/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KoungaMW12,
  author       = {Gina Kounga and
                  Chris J. Mitchell and
                  Thomas Walter},
  title        = {Generating certification authority authenticated public keys in \emph{ad
                  hoc} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {1},
  pages        = {87--106},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.279},
  doi          = {10.1002/SEC.279},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KoungaMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/0002TM12,
  author       = {Chunhua Chen and
                  Shaohua Tang and
                  Chris J. Mitchell},
  editor       = {Angelos D. Keromytis and
                  Roberto Di Pietro},
  title        = {Building General-Purpose Security Services on {EMV} Payment Cards},
  booktitle    = {Security and Privacy in Communication Networks - 8th International
                  {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012.
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {106},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36883-7\_3},
  doi          = {10.1007/978-3-642-36883-7\_3},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/0002TM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2012,
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0},
  doi          = {10.1007/978-3-642-35371-0},
  isbn         = {978-3-642-35370-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SongM11,
  author       = {Boyeon Song and
                  Chris J. Mitchell},
  title        = {Scalable {RFID} security protocols supporting tag ownership transfer},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {4},
  pages        = {556--566},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.02.027},
  doi          = {10.1016/J.COMCOM.2010.02.027},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/SongM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Al-SinaniM11,
  author       = {Haitham S. Al{-}Sinani and
                  Chris J. Mitchell},
  editor       = {Yingjiu Li},
  title        = {Enhancing CardSpace Authentication Using a Mobile Device},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_16},
  doi          = {10.1007/978-3-642-22348-8\_16},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Al-SinaniM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/Al-SinaniM11,
  author       = {Haitham S. Al{-}Sinani and
                  Chris J. Mitchell},
  editor       = {Svetla Petkova{-}Nikova and
                  Andreas Pashalidis and
                  G{\"{u}}nther Pernul},
  title        = {A Universal Client-Based Identity Management Tool},
  booktitle    = {Public Key Infrastructures, Services and Applications - 8th European
                  Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7163},
  pages        = {49--74},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29804-2\_4},
  doi          = {10.1007/978-3-642-29804-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/Al-SinaniM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ChenMT11,
  author       = {Chunhua Chen and
                  Chris J. Mitchell and
                  Shaohua Tang},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Building General Purpose Security Services on Trusted Computing},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {16--31},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_2},
  doi          = {10.1007/978-3-642-32298-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ChenMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/Al-SinaniM11,
  author       = {Haitham S. Al{-}Sinani and
                  Chris J. Mitchell},
  editor       = {Erol Gelenbe and
                  Ricardo Lent and
                  Georgia Sakellari},
  title        = {Client-Based CardSpace-OpenID Interoperation},
  booktitle    = {Computer and Information Sciences {II} - 26th International Symposium
                  on Computer and Information Sciences, London, UK, 26-28 September
                  2011},
  pages        = {387--393},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4471-2155-8\_49},
  doi          = {10.1007/978-1-4471-2155-8\_49},
  timestamp    = {Sat, 16 Sep 2017 12:11:33 +0200},
  biburl       = {https://dblp.org/rec/conf/iscis/Al-SinaniM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Al-SinaniM11,
  author       = {Haitham S. Al{-}Sinani and
                  Chris J. Mitchell},
  editor       = {Mehmet A. Orgun and
                  Atilla El{\c{c}}i and
                  Oleg B. Makarevich and
                  Sorin A. Huss and
                  Josef Pieprzyk and
                  Lyudmila K. Babenko and
                  Alexander G. Chefranov and
                  Rajan Shankaran},
  title        = {Extending the Scope of cardspace},
  booktitle    = {Proceedings of the 4th International Conference on Security of Information
                  and Networks, {SIN} 2011, Sydney, NSW, Australia, November 14-19,
                  2011},
  pages        = {235--238},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2070425.2070467},
  doi          = {10.1145/2070425.2070467},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/Al-SinaniM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ChenMT11,
  author       = {Chunhua Chen and
                  Chris J. Mitchell and
                  Shaohua Tang},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {{SSL/TLS} Session-Aware User Authentication Using a {GAA} Bootstrapped
                  Key},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {54--68},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_4},
  doi          = {10.1007/978-3-642-21040-2\_4},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/ChenMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ChenM10,
  author       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Parsing ambiguities in authentication and key establishment protocols},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {1},
  pages        = {82--94},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.032333},
  doi          = {10.1504/IJESDF.2010.032333},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/ChenM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/AlrodhanM10,
  author       = {Waleed A. Alrodhan and
                  Chris J. Mitchell},
  editor       = {Waleed W. Smari and
                  William K. McQuay},
  title        = {Enhancing user authentication in claim-based identity management},
  booktitle    = {2010 International Symposium on Collaborative Technologies and Systems,
                  {CTS} 2010, Chicago, Illinois, USA, May 17-21, 2010},
  pages        = {75--83},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CTS.2010.5478521},
  doi          = {10.1109/CTS.2010.5478521},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/AlrodhanM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idman/Al-SinaniM10,
  author       = {Haitham S. Al{-}Sinani and
                  Chris J. Mitchell},
  editor       = {Elisabeth de Leeuw and
                  Simone Fischer{-}H{\"{u}}bner and
                  Lothar Fritsch},
  title        = {Using CardSpace as a Password Manager},
  booktitle    = {Policies and Research in Identity Management - Second {IFIP} {WG}
                  11.6 Working Conference, {IDMAN} 2010, Oslo, Norway, November 18-19,
                  2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {343},
  pages        = {18--30},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17303-5\_2},
  doi          = {10.1007/978-3-642-17303-5\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idman/Al-SinaniM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idtrust/Al-SinaniAM10,
  author       = {Haitham S. Al{-}Sinani and
                  Waleed A. Alrodhan and
                  Chris J. Mitchell},
  editor       = {Ken Klingenstein and
                  Carl M. Ellison},
  title        = {CardSpace-liberty integration for CardSpace users},
  booktitle    = {Proceedings of the 9th Symposium on Identity and Trust on the Internet,
                  IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010},
  pages        = {12--25},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1750389.1750392},
  doi          = {10.1145/1750389.1750392},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idtrust/Al-SinaniAM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GalleryM09,
  author       = {Eimear Gallery and
                  Chris J. Mitchell},
  title        = {Trusted Computing: Security and Applications},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {3},
  pages        = {217--245},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802231140},
  doi          = {10.1080/01611190802231140},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GalleryM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/AlrodhanM09,
  author       = {Waleed A. Alrodhan and
                  Chris J. Mitchell},
  title        = {Improving the Security of CardSpace},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/167216},
  doi          = {10.1155/2009/167216},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/AlrodhanM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SongM09,
  author       = {Boyeon Song and
                  Chris J. Mitchell},
  editor       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  Haining Wang and
                  Wanlei Zhou},
  title        = {Scalable {RFID} Pseudonym Protocol},
  booktitle    = {Third International Conference on Network and System Security, {NSS}
                  2009, Gold Coast, Queensland, Australia, October 19-21, 2009},
  pages        = {216--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NSS.2009.15},
  doi          = {10.1109/NSS.2009.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/SongM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mitchell09,
  author       = {Chris J. Mitchell},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {A Novel Stateless Authentication Protocol},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {269--274},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_29},
  doi          = {10.1007/978-3-642-36213-2\_29},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mitchell09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mitchell09a,
  author       = {Chris J. Mitchell},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {A Novel Stateless Authentication Protocol},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {275--281},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_30},
  doi          = {10.1007/978-3-642-36213-2\_30},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mitchell09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2009,
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7},
  doi          = {10.1007/978-3-642-11145-7},
  isbn         = {978-3-642-11144-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2009,
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9},
  doi          = {10.1007/978-3-642-00587-9},
  isbn         = {978-3-642-00586-2},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2009,
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7},
  doi          = {10.1007/978-3-642-03944-7},
  isbn         = {978-3-642-03943-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BalfeGMP08,
  author       = {Shane Balfe and
                  Eimear Gallery and
                  Chris J. Mitchell and
                  Kenneth G. Paterson},
  title        = {Challenges for Trusted Computing},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {6},
  pages        = {60--66},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.138},
  doi          = {10.1109/MSP.2008.138},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BalfeGMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KalogridisM08,
  author       = {Georgios Kalogridis and
                  Chris J. Mitchell},
  title        = {Using Non-adaptive Group Testing to Construct Spy Agent Routes},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {1013--1019},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.169},
  doi          = {10.1109/ARES.2008.169},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KalogridisM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LeungM08,
  author       = {Adrian Leung and
                  Chris J. Mitchell},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Device Management Framework for Secure Ubiquitous Service Delivery},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {267--274},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.28},
  doi          = {10.1109/IAS.2008.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LeungM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idtrust/AlrodhanM08,
  author       = {Waleed A. Alrodhan and
                  Chris J. Mitchell},
  editor       = {Kent E. Seamons and
                  Neal McBurnett and
                  Tim Polk},
  title        = {A client-side CardSpace-Liberty integration architecture},
  booktitle    = {IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust
                  on the Internet, March 4-6, 2008, Gaithersburg, Maryland, {USA}},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {283},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1373290.1373292},
  doi          = {10.1145/1373290.1373292},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idtrust/AlrodhanM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LeungCM08,
  author       = {Adrian Leung and
                  Liqun Chen and
                  Chris J. Mitchell},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {On a Possible Privacy Flaw in Direct Anonymous Attestation {(DAA)}},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {179--190},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_14},
  doi          = {10.1007/978-3-540-68979-9\_14},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LeungCM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SongM08,
  author       = {Boyeon Song and
                  Chris J. Mitchell},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {{RFID} authentication protocol for low-cost tags},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {140--147},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352556},
  doi          = {10.1145/1352533.1352556},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SongM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenM08,
  author       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Parsing ambiguities in authentication and key establishment protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/419},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MitchellPW07,
  author       = {Chris J. Mitchell and
                  Fred Piper and
                  Peter R. Wild},
  title        = {ID-based cryptography using symmetric primitives},
  journal      = {Des. Codes Cryptogr.},
  volume       = {44},
  number       = {1-3},
  pages        = {249--262},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9095-0},
  doi          = {10.1007/S10623-007-9095-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MitchellPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMicec/AbbadiM07,
  author       = {Imad M. Abbadi and
                  Chris J. Mitchell},
  editor       = {Maria L. Gini and
                  Robert J. Kauffman and
                  Donna Sarppo and
                  Chrysanthos Dellarocas and
                  Frank Dignum},
  title        = {Digital rights management using a mobile phone},
  booktitle    = {Proceedings of the 9th International Conference on Electronic Commerce:
                  The Wireless World of Electronic Commerce, 2007, University of Minnesota,
                  Minneapolis, MN, USA, August 19-22, 2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {258},
  pages        = {185--194},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1282100.1282138},
  doi          = {10.1145/1282100.1282138},
  timestamp    = {Tue, 06 Apr 2021 12:12:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMicec/AbbadiM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AriyapperumaM07,
  author       = {Suranjith Ariyapperuma and
                  Chris J. Mitchell},
  title        = {Security vulnerabilities in {DNS} and {DNSSEC}},
  booktitle    = {Proceedings of the The Second International Conference on Availability,
                  Reliability and Security, {ARES} 2007, The International Dependability
                  Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
                  Austria},
  pages        = {335--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARES.2007.139},
  doi          = {10.1109/ARES.2007.139},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AriyapperumaM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AlrodhanM07,
  author       = {Waleed A. Alrodhan and
                  Chris J. Mitchell},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Addressing privacy issues in CardSpace},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {285--291},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.12},
  doi          = {10.1109/IAS.2007.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AlrodhanM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/GalleryM07,
  author       = {Eimear Gallery and
                  Chris J. Mitchell},
  editor       = {Alessandro Aldini and
                  Roberto Gorrieri},
  title        = {Trusted Mobile Platforms},
  booktitle    = {Foundations of Security Analysis and Design IV, {FOSAD} 2006/2007
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {4677},
  pages        = {282--323},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74810-6\_10},
  doi          = {10.1007/978-3-540-74810-6\_10},
  timestamp    = {Thu, 14 Oct 2021 10:12:35 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/GalleryM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/LeungM07,
  author       = {Adrian Leung and
                  Chris J. Mitchell},
  editor       = {John Krumm and
                  Gregory D. Abowd and
                  Aruna Seneviratne and
                  Thomas Strang},
  title        = {Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous
                  Environments},
  booktitle    = {UbiComp 2007: Ubiquitous Computing, 9th International Conference,
                  UbiComp 2007, Innsbruck, Austria, September 16-19, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4717},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74853-3\_5},
  doi          = {10.1007/978-3-540-74853-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/huc/LeungM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Mitchell07,
  author       = {Chris J. Mitchell},
  editor       = {Steven D. Galbraith},
  title        = {Cryptanalysis of the {EPBC} Authenticated Encryption Mode},
  booktitle    = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  pages        = {118--128},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9\_8},
  doi          = {10.1007/978-3-540-77272-9\_8},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Mitchell07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/Mitchell06,
  author       = {Chris J. Mitchell},
  title        = {Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauensw{\"{u}}rdiges
                  Rechnen)},
  journal      = {it Inf. Technol.},
  volume       = {48},
  number       = {6},
  pages        = {321},
  year         = {2006},
  url          = {https://doi.org/10.1524/itit.2006.48.6.321},
  doi          = {10.1524/ITIT.2006.48.6.321},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/Mitchell06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/TangM06,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  title        = {Cryptanalysis of a hybrid authentication protocol for large mobile
                  networks},
  journal      = {J. Syst. Softw.},
  volume       = {79},
  number       = {4},
  pages        = {496--501},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.jss.2005.04.022},
  doi          = {10.1016/J.JSS.2005.04.022},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/TangM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LeungM06,
  author       = {Adrian Leung and
                  Chris J. Mitchell},
  editor       = {Manu Malek and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Javier Hernando},
  title        = {A Service Discovery Threat Model for Ad Hoc Networks},
  booktitle    = {{SECRYPT} 2006, Proceedings of the International Conference on Security
                  and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
                  {SECRYPT} is part of {ICETE} - The International Joint Conference
                  on e-Business and Telecommunications},
  pages        = {167--174},
  publisher    = {{INSTICC} Press},
  year         = {2006},
  timestamp    = {Thu, 18 Oct 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LeungM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NachtigalM06,
  author       = {Sharon Nachtigal and
                  Chris J. Mitchell},
  editor       = {Manu Malek and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Javier Hernando},
  title        = {Modelling E-Business Security Using Business Processes},
  booktitle    = {{SECRYPT} 2006, Proceedings of the International Conference on Security
                  and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
                  {SECRYPT} is part of {ICETE} - The International Joint Conference
                  on e-Business and Telecommunications},
  pages        = {459--464},
  publisher    = {{INSTICC} Press},
  year         = {2006},
  timestamp    = {Thu, 28 Sep 2006 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NachtigalM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mitchell06,
  author       = {Chris J. Mitchell},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Using Human Interactive Proofs to Secure Human-Machine Interactions
                  via Untrusted Intermediaries},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {164--170},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_22},
  doi          = {10.1007/978-3-642-04904-0\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mitchell06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mitchell06a,
  author       = {Chris J. Mitchell},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Using Human Interactive Proofs to Secure Human-Machine Interactions
                  via Untrusted Intermediaries},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {171--176},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_23},
  doi          = {10.1007/978-3-642-04904-0\_23},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mitchell06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RantosM05,
  author       = {Konstantinos Rantos and
                  Chris J. Mitchell},
  title        = {Matching key recovery mechanisms to business requirements},
  journal      = {Comput. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {232--245},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.cose.2004.08.010},
  doi          = {10.1016/J.COSE.2004.08.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RantosM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/TangM05,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  title        = {Comments on a cryptographic key assignment scheme},
  journal      = {Comput. Stand. Interfaces},
  volume       = {27},
  number       = {3},
  pages        = {323--326},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.csi.2004.07.001},
  doi          = {10.1016/J.CSI.2004.07.001},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/TangM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/TangM05a,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  title        = {Comments on two anonymous conference key distribution systems},
  journal      = {Comput. Stand. Interfaces},
  volume       = {27},
  number       = {4},
  pages        = {397--400},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.csi.2004.08.006},
  doi          = {10.1016/J.CSI.2004.08.006},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/TangM05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/GajpariaMY05,
  author       = {Anand S. Gajparia and
                  Chris J. Mitchell and
                  Chan Yeob Yeun},
  title        = {Supporting User Privacy in Location Based Services},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {88-B},
  number       = {7},
  pages        = {2837--2847},
  year         = {2005},
  url          = {https://doi.org/10.1093/ietcom/e88-b.7.2837},
  doi          = {10.1093/IETCOM/E88-B.7.2837},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/GajpariaMY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlsaidM05,
  author       = {Adil Alsaid and
                  Chris J. Mitchell},
  title        = {Dynamic content attacks on digital signatures},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {4},
  pages        = {328--336},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510614443},
  doi          = {10.1108/09685220510614443},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AlsaidM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KnudsenM05,
  author       = {Lars R. Knudsen and
                  Chris J. Mitchell},
  title        = {Partial Key Recovery Attack Against {RMAC}},
  journal      = {J. Cryptol.},
  volume       = {18},
  number       = {4},
  pages        = {375--389},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00145-004-0324-7},
  doi          = {10.1007/S00145-004-0324-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KnudsenM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Mitchell05,
  author       = {Chris J. Mitchell},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Cryptanalysis of Two Variants of {PCBC} Mode When Used for Message
                  Integrity},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {560--571},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_47},
  doi          = {10.1007/11506157\_47},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Mitchell05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TangM05,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {On the Security of Some Password-Based Key Agreement Schemes},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {149--154},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_22},
  doi          = {10.1007/11596981\_22},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TangM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TangM05a,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Efficient Compilers for Authenticated Group Key Exchange},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {192--197},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_29},
  doi          = {10.1007/11596981\_29},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/TangM05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/KalogridisMC05,
  author       = {Georgios Kalogridis and
                  Chris J. Mitchell and
                  Gary Clemo},
  editor       = {Hamid R. Arabnia},
  title        = {Spy Agents: Evaluating Trust in Remote Environments},
  booktitle    = {Proceedings of The 2005 International Conference on Security and Management,
                  {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005},
  pages        = {405--411},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Thu, 18 Oct 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/KalogridisMC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/PriceM05,
  author       = {Geraint Price and
                  Chris J. Mitchell},
  editor       = {David W. Chadwick and
                  Gansen Zhao},
  title        = {Interoperation Between a Conventional {PKI} and an ID-Based Infrastructure},
  booktitle    = {Public Key Infrastructure, Second European {PKI} Workshop: Research
                  and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1,
                  2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3545},
  pages        = {73--85},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11533733\_5},
  doi          = {10.1007/11533733\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/PriceM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/AlsaidM05,
  author       = {Adil Alsaid and
                  Chris J. Mitchell},
  editor       = {David W. Chadwick and
                  Gansen Zhao},
  title        = {Installing Fake Root Keys in a {PC}},
  booktitle    = {Public Key Infrastructure, Second European {PKI} Workshop: Research
                  and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1,
                  2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3545},
  pages        = {227--239},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11533733\_16},
  doi          = {10.1007/11533733\_16},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/AlsaidM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GougetSBCDM05,
  author       = {Aline Gouget and
                  Herv{\'{e}} Sibert and
                  C{\^{o}}me Berbain and
                  Nicolas T. Courtois and
                  Blandine Debraize and
                  Chris J. Mitchell},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Analysis of the Bit-Search Generator and Sequence Compression Techniques},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {196--214},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_13},
  doi          = {10.1007/11502760\_13},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GougetSBCDM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YauPM05,
  author       = {Arnold K. L. Yau and
                  Kenneth G. Paterson and
                  Chris J. Mitchell},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random
                  IVs},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {299--319},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_20},
  doi          = {10.1007/11502760\_20},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YauPM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TangM05,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  editor       = {Sihan Qing and
                  Wenbo Mao and
                  Javier L{\'{o}}pez and
                  Guilin Wang},
  title        = {Security Properties of Two Authenticated Conference Key Agreement
                  Protocols},
  booktitle    = {Information and Communications Security, 7th International Conference,
                  {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3783},
  pages        = {304--314},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602897\_26},
  doi          = {10.1007/11602897\_26},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/TangM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Mitchell05,
  author       = {Chris J. Mitchell},
  editor       = {Nigel P. Smart},
  title        = {Partial Key Recovery Attacks on XCBC, {TMAC} and {OMAC}},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {155--167},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_11},
  doi          = {10.1007/11586821\_11},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Mitchell05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Mitchell05,
  author       = {Chris J. Mitchell},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Error Oracle Attacks on {CBC} Mode: Is There a Future for {CBC} Mode
                  Encryption?},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {244--258},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_18},
  doi          = {10.1007/11556992\_18},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Mitchell05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/HuM05,
  author       = {Shenglan Hu and
                  Chris J. Mitchell},
  editor       = {Xiaohua Jia and
                  Jie Wu and
                  Yanxiang He},
  title        = {Improving {IP} Address Autoconfiguration Security in MANETs Using
                  Trust Modelling},
  booktitle    = {Mobile Ad-hoc and Sensor Networks, First International Conference,
                  {MSN} 2005, Wuhan, China, December 13-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3794},
  pages        = {83--92},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599463\_9},
  doi          = {10.1007/11599463\_9},
  timestamp    = {Wed, 11 Mar 2020 08:37:17 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/HuM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MacDonaldSM05,
  author       = {John A. MacDonald and
                  William G. Sirett and
                  Chris J. Mitchell},
  editor       = {Ry{\^{o}}ichi Sasaki and
                  Sihan Qing and
                  Eiji Okamoto and
                  Hiroshi Yoshiura},
  title        = {Overcoming Channel Bandwidth Constraints in Secure {SIM} Applications},
  booktitle    = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
                  20th International Conference on Information Security {(SEC} 2005),
                  May 30 - June 1, 2005, Chiba, Japan},
  series       = {{IFIP}},
  volume       = {181},
  pages        = {539--550},
  publisher    = {Springer},
  year         = {2005},
  timestamp    = {Fri, 19 May 2017 01:25:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/MacDonaldSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/AlsaidM05,
  author       = {Adil Alsaid and
                  Chris J. Mitchell},
  editor       = {Christopher Wolf and
                  Stefan Lucks and
                  Po{-}Wah Yau},
  title        = {A Scanning Tool for {PC} Root Public Key Stores},
  booktitle    = {WEWoRC 2005 - Western European Workshop on Research in Cryptology,
                  July 5-7, 2005, Leuven, Belgium},
  series       = {{LNI}},
  volume       = {{P-74}},
  pages        = {45--52},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/24849},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/AlsaidM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangM05,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  title        = {Cryptanalysis of an anonymous wireless authentication and conference
                  key distribution scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/047},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangM05a,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  title        = {Cryptanalysis of two identification schemes based on an ID-based cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/048},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangM05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangM05b,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  title        = {Enhanced password-based key establishment protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/141},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangM05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangM05c,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  title        = {On the security of some password-based key agreement schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/156},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangM05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangM05d,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  title        = {Weaknesses in a leakage-resilient authenticated key transport protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/173},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangM05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangM05e,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  title        = {Security properties of two provably secure conference key agreement
                  protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/185},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangM05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangM05f,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  title        = {Efficient Compilers for Authenticated Group Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/366},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangM05f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/NgM04,
  author       = {Siaw{-}Lynn Ng and
                  Chris J. Mitchell},
  title        = {Comments on mutual authentication and key exchange protocols for low
                  power wireless communications},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {8},
  number       = {4},
  pages        = {262--263},
  year         = {2004},
  url          = {https://doi.org/10.1109/LCOMM.2004.825724},
  doi          = {10.1109/LCOMM.2004.825724},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/NgM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/PashalidisM04,
  author       = {Andreas Pashalidis and
                  Chris J. Mitchell},
  editor       = {Sokratis K. Katsikas and
                  Stefanos Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Using {EMV} Cards for Single Sign-On},
  booktitle    = {Public Key Infrastructure, First European PKIWorkshop: Research and
                  Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3093},
  pages        = {205--217},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25980-0\_17},
  doi          = {10.1007/978-3-540-25980-0\_17},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/PashalidisM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/PashalidisM04,
  author       = {Andreas Pashalidis and
                  Chris J. Mitchell},
  title        = {Impostor: a single sign-on system for use from untrusted devices},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}
                  '04, Dallas, Texas, USA, 29 November - 3 December 2004},
  pages        = {2191--2195},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/GLOCOM.2004.1378398},
  doi          = {10.1109/GLOCOM.2004.1378398},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/PashalidisM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11/PashalidisM04,
  author       = {Andreas Pashalidis and
                  Chris J. Mitchell},
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {A Security Model for Anonymous Credential Systems},
  booktitle    = {Information Security Management, Education and Privacy, {IFIP} 18th
                  World Computer Congress, {TC11} 19th International Information Security
                  Workshops, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {148},
  pages        = {183--198},
  publisher    = {Kluwer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8145-6\_16},
  doi          = {10.1007/1-4020-8145-6\_16},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11/PashalidisM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PashalidisM04,
  author       = {Andreas Pashalidis and
                  Chris J. Mitchell},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Limits to Anonymity When Using Credentials},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {4--12},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_2},
  doi          = {10.1007/11861386\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/PashalidisM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mitchell04,
  author       = {Chris J. Mitchell},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Limits to Anonymity When Using Credentials (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {13--19},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_3},
  doi          = {10.1007/11861386\_3},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mitchell04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangM04,
  author       = {Qiang Tang and
                  Chris J. Mitchell},
  title        = {Rethinking the security of some authenticated group key agreement
                  schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/363},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/HsuWWM03,
  author       = {Chien{-}Lung Hsu and
                  Tzong{-}Sun Wu and
                  Tzong{-}Chen Wu and
                  Chris J. Mitchell},
  title        = {Improvement of modified authenticated key agreement protocol},
  journal      = {Appl. Math. Comput.},
  volume       = {142},
  number       = {2-3},
  pages        = {305--308},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0096-3003(02)00304-1},
  doi          = {10.1016/S0096-3003(02)00304-1},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/HsuWWM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/KnudsenM03,
  author       = {Lars R. Knudsen and
                  Chris J. Mitchell},
  title        = {Analysis of 3gpp-MAC and Two-key 3gpp-MAC},
  journal      = {Discret. Appl. Math.},
  volume       = {128},
  number       = {1},
  pages        = {181--191},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0166-218X(02)00444-4},
  doi          = {10.1016/S0166-218X(02)00444-4},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/KnudsenM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PashalidisM03,
  author       = {Andreas Pashalidis and
                  Chris J. Mitchell},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Taxonomy of Single Sign-On Systems},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {249--264},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_22},
  doi          = {10.1007/3-540-45067-X\_22},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PashalidisM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/RilaM03,
  author       = {Luciano Rila and
                  Chris J. Mitchell},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Yongfei Han},
  title        = {Security Protocols for Biometrics-Based Cardholder Authentication
                  in Smartcards},
  booktitle    = {Applied Cryptography and Network Security, First International Conference,
                  {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2846},
  pages        = {254--264},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45203-4\_20},
  doi          = {10.1007/978-3-540-45203-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/RilaM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bled/Al-MeaitherM03,
  author       = {Mansour A. Al{-}Meaither and
                  Chris J. Mitchell},
  title        = {A Secure Electronic Murabaha Transaction},
  booktitle    = {16th Bled eConference: eTransformation, Bled, Slovenia, June 9-11,
                  2003},
  pages        = {5},
  year         = {2003},
  url          = {http://aisel.aisnet.org/bled2003/5},
  timestamp    = {Mon, 09 Jul 2018 07:55:38 +0200},
  biburl       = {https://dblp.org/rec/conf/bled/Al-MeaitherM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/BorseliusM03,
  author       = {Niklas Borselius and
                  Chris J. Mitchell},
  editor       = {Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {Securing {FIPA} Agent Communication},
  booktitle    = {Proceedings of the International Conference on Security and Management,
                  {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1},
  pages        = {135--141},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/BorseliusM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/Al-MeaitherM03,
  author       = {Mansour A. Al{-}Meaither and
                  Chris J. Mitchell},
  editor       = {Kurt Bauknecht and
                  A Min Tjoa and
                  Gerald Quirchmayr},
  title        = {A Secure Electronic Payment Scheme for Charity Donations},
  booktitle    = {E-Commerce and Web Technologies, 4th International Conference, EC-Web,
                  Prague, Czech Republic, September 2-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2738},
  pages        = {50--61},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45229-4\_6},
  doi          = {10.1007/978-3-540-45229-4\_6},
  timestamp    = {Tue, 29 Dec 2020 18:30:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ecweb/Al-MeaitherM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/Khu-smithM03,
  author       = {Vorapranee Khu{-}smith and
                  Chris J. Mitchell},
  editor       = {Kurt Bauknecht and
                  A Min Tjoa and
                  Gerald Quirchmayr},
  title        = {Enhancing E-commerce Security Using {GSM} Authentication},
  booktitle    = {E-Commerce and Web Technologies, 4th International Conference, EC-Web,
                  Prague, Czech Republic, September 2-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2738},
  pages        = {72--83},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45229-4\_8},
  doi          = {10.1007/978-3-540-45229-4\_8},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecweb/Khu-smithM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Mitchell03,
  author       = {Chris J. Mitchell},
  editor       = {Kenneth G. Paterson},
  title        = {Remote User Authentication Using Public Information},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {360--369},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_28},
  doi          = {10.1007/978-3-540-40974-8\_28},
  timestamp    = {Wed, 18 Mar 2020 16:01:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Mitchell03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/PashalidisM03,
  author       = {Andreas Pashalidis and
                  Chris J. Mitchell},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Single Sign-On Using Trusted Platforms},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {54--68},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_5},
  doi          = {10.1007/10958513\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/PashalidisM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PagliusiM03,
  author       = {Paulo S. Pagliusi and
                  Chris J. Mitchell},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous
                  Access},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {135--149},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_11},
  doi          = {10.1007/978-3-540-24591-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PagliusiM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/BorseliusMW02,
  author       = {Niklas Borselius and
                  Chris J. Mitchell and
                  Aaron Wilson},
  title        = {A pragmatic alternative to undetachable signatures},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {36},
  number       = {2},
  pages        = {6--11},
  year         = {2002},
  url          = {https://doi.org/10.1145/509526.509529},
  doi          = {10.1145/509526.509529},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/BorseliusMW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/BorseliusMW02a,
  author       = {Niklas Borselius and
                  Chris J. Mitchell and
                  Aaron Wilson},
  title        = {On the value of threshold signatures},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {36},
  number       = {4},
  pages        = {30--35},
  year         = {2002},
  url          = {https://doi.org/10.1145/583800.583804},
  doi          = {10.1145/583800.583804},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/BorseliusMW02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/HornMM02,
  author       = {G{\"{u}}nther Horn and
                  Keith M. Martin and
                  Chris J. Mitchell},
  title        = {Authentication protocols for mobile network environment value-added
                  services},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {51},
  number       = {2},
  pages        = {383--392},
  year         = {2002},
  url          = {https://doi.org/10.1109/25.994813},
  doi          = {10.1109/25.994813},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/HornMM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/RilaM02,
  author       = {Luciano Rila and
                  Chris J. Mitchell},
  editor       = {Peter Honeyman},
  title        = {Security Analysis of Smartcard to Card Reader Communications for Biometric
                  Cardholder Authentication},
  booktitle    = {Proceedings of the Fifth Smart Card Research and Advanced Application
                  Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}},
  publisher    = {{USENIX}},
  year         = {2002},
  url          = {http://www.usenix.org/publications/library/proceedings/cardis02/rila.html},
  timestamp    = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/RilaM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/MitchellH02,
  author       = {Chris J. Mitchell and
                  Namhyun Hur},
  editor       = {Borka Jerman{-}Blazic and
                  Tomaz Klobucar},
  title        = {On the security of a structural proven signer ordering multisignature
                  scheme},
  booktitle    = {Advanced Communications and Multimedia Security, {IFIP} {TC6/TC11}
                  Sixth Joint Working Conference on Communications and Multimedia Security,
                  September 26-27, 2002, Portoroz, Slovenia},
  series       = {{IFIP} Conference Proceedings},
  volume       = {228},
  pages        = {1--8},
  publisher    = {Kluwer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-0-387-35612-9\_1},
  doi          = {10.1007/978-0-387-35612-9\_1},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/MitchellH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/Al-RiyamiM02,
  author       = {Sattam S. Al{-}Riyami and
                  Chris J. Mitchell},
  editor       = {Borka Jerman{-}Blazic and
                  Tomaz Klobucar},
  title        = {Renewing crytographic timestamps},
  booktitle    = {Advanced Communications and Multimedia Security, {IFIP} {TC6/TC11}
                  Sixth Joint Working Conference on Communications and Multimedia Security,
                  September 26-27, 2002, Portoroz, Slovenia},
  series       = {{IFIP} Conference Proceedings},
  volume       = {228},
  pages        = {9--16},
  publisher    = {Kluwer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-0-387-35612-9\_2},
  doi          = {10.1007/978-0-387-35612-9\_2},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/Al-RiyamiM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/Khu-SmithM02,
  author       = {Vorapranee Khu{-}smith and
                  Chris J. Mitchell},
  editor       = {Kurt Bauknecht and
                  A Min Tjoa and
                  Gerald Quirchmayr},
  title        = {Using {EMV} Cards to Protect E-commerce Transactions},
  booktitle    = {E-Commerce and Web Technologies, Third International Conference, EC-Web
                  2002, Aix-en-Provence, France, September 2-6, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2455},
  pages        = {388--399},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45705-4\_40},
  doi          = {10.1007/3-540-45705-4\_40},
  timestamp    = {Tue, 29 Dec 2020 18:30:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ecweb/Khu-SmithM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/JarupunpholM02,
  author       = {Pita Jarupunphol and
                  Chris J. Mitchell},
  editor       = {Jo{\~{a}}o L. Monteiro and
                  Paula M. C. Swatman and
                  Lu{\'{\i}}s Valadares Tavares},
  title        = {Implementation Aspects of {SET/EMV}},
  booktitle    = {Towards The Knowledge Society: eCommerce, eBusiness, and eGovernment,
                  The Second {IFIP} Conference on E-Commerce, E-Business, E-Government
                  {(I3E} 2002), October 7-9, 2002, Lisbon, Portugal},
  series       = {{IFIP} Conference Proceedings},
  volume       = {233},
  pages        = {305--315},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 09 Oct 2002 13:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/JarupunpholM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MitchellP02,
  author       = {Chris J. Mitchell and
                  Paulo S. Pagliusi},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Is Entity Authentication Necessary?},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {20--33},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_4},
  doi          = {10.1007/978-3-540-39871-4\_4},
  timestamp    = {Sat, 05 Sep 2020 18:04:37 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MitchellP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/witasi/JarupunpholM02,
  author       = {Pita Jarupunphol and
                  Chris J. Mitchell},
  editor       = {Wojciech Cellary and
                  Arun Iyengar},
  title        = {E-commerce and the Media - Influences on Security Risk Perceptions},
  booktitle    = {Internet Technologies, Applications and Social Impact, {IFIP} {TC6/WG6.4}
                  Workshop on Internet Technologies, Applications and Social Impact
                  {(WITASI} 2002), October 10-11, 2002, Wroclaw, Poland},
  series       = {{IFIP} Conference Proceedings},
  volume       = {232},
  pages        = {163--174},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Fri, 18 Oct 2002 12:13:55 +0200},
  biburl       = {https://dblp.org/rec/conf/witasi/JarupunpholM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmc/Khu-smithM02,
  author       = {Vorapranee Khu{-}smith and
                  Chris J. Mitchell},
  editor       = {Marisa S. Viveros and
                  Hui Lei and
                  Ouri Wolfson},
  title        = {Using {GSM} to enhance e-commerce security},
  booktitle    = {Proceedings of the 2nd International Workshop on Mobile Commerce,
                  Atlanta, Georgia, USA, September 28, 2002},
  pages        = {75--81},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/570705.570720},
  doi          = {10.1145/570705.570720},
  timestamp    = {Tue, 10 Mar 2020 16:23:49 +0100},
  biburl       = {https://dblp.org/rec/conf/wmc/Khu-smithM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/KnudsenM01,
  author       = {Lars R. Knudsen and
                  Chris J. Mitchell},
  title        = {An analysis of the 3gpp-MAC scheme},
  journal      = {Electron. Notes Discret. Math.},
  volume       = {6},
  pages        = {346--355},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0653(04)00186-6},
  doi          = {10.1016/S1571-0653(04)00186-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/endm/KnudsenM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BrincatM01,
  author       = {Karl Brincat and
                  Chris J. Mitchell},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {New {CBC-MAC} Forgery Attacks},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_2},
  doi          = {10.1007/3-540-47719-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BrincatM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Khu-smithM01,
  author       = {Vorapranee Khu{-}smith and
                  Chris J. Mitchell},
  editor       = {Kwangjo Kim},
  title        = {Enhancing the Security of Cookies},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {132--145},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_11},
  doi          = {10.1007/3-540-45861-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Khu-smithM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BrincatM01,
  author       = {Karl Brincat and
                  Chris J. Mitchell},
  editor       = {Bahram Honary},
  title        = {Key Recovery Attacks on MACs Based on Properties of Cryptographic
                  APIs},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {63--72},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_7},
  doi          = {10.1007/3-540-45325-3\_7},
  timestamp    = {Wed, 18 Mar 2020 16:01:01 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BrincatM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BorseliusMW01,
  author       = {Niklas Borselius and
                  Chris J. Mitchell and
                  Aaron Wilson},
  editor       = {Bahram Honary},
  title        = {Undetachable Threshold Signatures},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {239--244},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_21},
  doi          = {10.1007/3-540-45325-3\_21},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BorseliusMW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/RantosM01,
  author       = {Konstantinos Rantos and
                  Chris J. Mitchell},
  editor       = {Bahram Honary},
  title        = {Key Recovery Scheme Interoperability - {A} Protocol for Mechanism
                  Negotiation},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {268--276},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_23},
  doi          = {10.1007/3-540-45325-3\_23},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/RantosM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsec/BorseliusMW01,
  author       = {Niklas Borselius and
                  Chris J. Mitchell and
                  Aaron Wilson},
  editor       = {Bart De Decker and
                  Frank Piessens and
                  Jan Smits and
                  Els Van Herreweghen},
  title        = {On Mobile Agent Based Transactions in Moderately Hostile Environments},
  booktitle    = {Advances in Network and Distributed Systems Security, {IFIP} {TC11}
                  {WG11.4} First Annual Working Conference on Network Security, November
                  26-27, 2001, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {206},
  pages        = {173--186},
  publisher    = {Kluwer},
  year         = {2001},
  url          = {https://doi.org/10.1007/0-306-46958-8\_12},
  doi          = {10.1007/0-306-46958-8\_12},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsec/BorseliusMW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mitchell00,
  author       = {Chris J. Mitchell},
  title        = {{PKI} standards},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {5},
  number       = {4},
  pages        = {17--32},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1363-4127(00)04003-6},
  doi          = {10.1016/S1363-4127(00)04003-6},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Mitchell00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Mitchell00,
  author       = {Chris J. Mitchell},
  title        = {Making serial number based authentication robust against loss of state},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {34},
  number       = {3},
  pages        = {56--59},
  year         = {2000},
  url          = {https://doi.org/10.1145/506117.506124},
  doi          = {10.1145/506117.506124},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Mitchell00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoppersmithKM00,
  author       = {Don Coppersmith and
                  Lars R. Knudsen and
                  Chris J. Mitchell},
  editor       = {Mihir Bellare},
  title        = {Key Recovery and Forgery Attacks on the MacDES {MAC} Algorithm},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {184--196},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_11},
  doi          = {10.1007/3-540-44598-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoppersmithKM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/MitchellR99,
  author       = {Chris J. Mitchell and
                  Konstantinos Rantos},
  title        = {A fair certification protocol},
  journal      = {Comput. Commun. Rev.},
  volume       = {29},
  number       = {3},
  pages        = {47--49},
  year         = {1999},
  url          = {https://doi.org/10.1145/505724.505730},
  doi          = {10.1145/505724.505730},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccr/MitchellR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmobile/MartinM99,
  author       = {Keith M. Martin and
                  Chris J. Mitchell},
  title        = {Comments on an optimized protocol for mobile network authentication
                  and security},
  journal      = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {37},
  year         = {1999},
  url          = {https://doi.org/10.1145/584027.584036},
  doi          = {10.1145/584027.584036},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmobile/MartinM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/MitchellP98,
  author       = {Chris J. Mitchell and
                  Kenneth G. Paterson},
  title        = {Perfect Factors from Cyclic Codes and Interleaving},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {11},
  number       = {2},
  pages        = {241--264},
  year         = {1998},
  url          = {https://doi.org/10.1137/S089548019630649X},
  doi          = {10.1137/S089548019630649X},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/MitchellP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/MitchellY98,
  author       = {Chris J. Mitchell and
                  Chan Yeob Yeun},
  title        = {Fixing a Problem in the Helsinki Protocol},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {21--24},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302356},
  doi          = {10.1145/302350.302356},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/MitchellY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Mitchell98,
  author       = {Chris J. Mitchell},
  title        = {On Integer-Valued Rational Polynomials and Depth Distributions of
                  Binary Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {44},
  number       = {7},
  pages        = {3146--3150},
  year         = {1998},
  url          = {https://doi.org/10.1109/18.737545},
  doi          = {10.1109/18.737545},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Mitchell98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RyanGGKM98,
  author       = {Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Li Gong and
                  G{\"{u}}nter Karjoth and
                  Chris J. Mitchell},
  title        = {Panel Introduction: The Security Impact of Distributed Computing Technologies},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {164--166},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSFW.1998.683166},
  doi          = {10.1109/CSFW.1998.683166},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RyanGGKM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isn/MartinPMHHPH98,
  author       = {Keith M. Martin and
                  Bart Preneel and
                  Chris J. Mitchell and
                  Hans{-}Joachim Hitz and
                  G{\"{u}}nther Horn and
                  Alla Poliakova and
                  Peter Howard},
  editor       = {Sebastiano Trigila and
                  Alvin P. Mullery and
                  M{\'{a}}rio Campolargo and
                  Hans Vanderstraeten and
                  Marcel Mampaey},
  title        = {Secure Billing for Mobile Information Services in {UMTS}},
  booktitle    = {Intelligence in Services and Networks: Technology for Ubiquitous Telecom
                  Services, 5th International Conference on Intelligence and Services
                  in Networks, IS{\&}N'98, Antwerp, Belgium, May 25-28, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1430},
  pages        = {535--548},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0056997},
  doi          = {10.1007/BFB0056997},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isn/MartinPMHHPH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/HanMG97,
  author       = {Yongfei Han and
                  Chris J. Mitchell and
                  Dieter Gollmann},
  title        = {A fast modular exponentiation for rsa on systolic arrays},
  journal      = {Int. J. Comput. Math.},
  volume       = {63},
  number       = {3-4},
  pages        = {215--226},
  year         = {1997},
  url          = {https://doi.org/10.1080/00207169708804562},
  doi          = {10.1080/00207169708804562},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcm/HanMG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mitchell97,
  author       = {Chris J. Mitchell},
  title        = {Authentication using cryptography},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {2},
  number       = {2},
  pages        = {25--32},
  year         = {1997},
  url          = {https://doi.org/10.1016/S1363-4127(97)81326-X},
  doi          = {10.1016/S1363-4127(97)81326-X},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Mitchell97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/Mitchell97,
  author       = {Chris J. Mitchell},
  title        = {De Bruijn Sequences and Perfect Factors},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {10},
  number       = {2},
  pages        = {270--281},
  year         = {1997},
  url          = {https://doi.org/10.1137/S0895480195290911},
  doi          = {10.1137/S0895480195290911},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/Mitchell97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/ChenGM97,
  author       = {Liqun Chen and
                  Dieter Gollmann and
                  Chris J. Mitchell},
  title        = {Authentication Using Minimally Trusted Servers},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {31},
  number       = {3},
  pages        = {16--28},
  year         = {1997},
  url          = {https://doi.org/10.1145/270555.270557},
  doi          = {10.1145/270555.270557},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/ChenGM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/HoyleM97,
  author       = {Mark P. Hoyle and
                  Chris J. Mitchell},
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {On Solutions to the Key Escrow Problem},
  booktitle    = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  pages        = {277--306},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-49248-8\_13},
  doi          = {10.1007/3-540-49248-8\_13},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/HoyleM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenGMW97,
  author       = {Liqun Chen and
                  Dieter Gollmann and
                  Chris J. Mitchell and
                  Peter R. Wild},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {Secret Sharing with Reusable Polynomials},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {183--193},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027925},
  doi          = {10.1007/BFB0027925},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenGMW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChenM97,
  author       = {Liqun Chen and
                  Chris J. Mitchell},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {An anonymous and undeniable payment scheme},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {478--482},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028504},
  doi          = {10.1007/BFB0028504},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChenM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MitchellPWW96,
  author       = {Chris J. Mitchell and
                  Fred Piper and
                  Michael Walker and
                  Peter R. Wild},
  title        = {Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy
                  and Secret Sharing Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {101--110},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018052831124},
  doi          = {10.1023/A:1018052831124},
  timestamp    = {Tue, 12 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MitchellPWW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GollmannHM96,
  author       = {Dieter Gollmann and
                  Yongfei Han and
                  Chris J. Mitchell},
  title        = {Redundant Integer Representations and Fast Exponentiation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {135--151},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018013116103},
  doi          = {10.1023/A:1018013116103},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GollmannHM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mitchell96,
  author       = {Chris J. Mitchell},
  title        = {The royal holloway TTP-based key escrow scheme},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {1},
  number       = {1},
  pages        = {63--69},
  year         = {1996},
  url          = {https://doi.org/10.1016/1363-4127(96)89811-6},
  doi          = {10.1016/1363-4127(96)89811-6},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Mitchell96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/HurlbertMP96,
  author       = {Glenn Hurlbert and
                  Chris J. Mitchell and
                  Kenneth G. Paterson},
  title        = {On the Existence of de Bruijn Tori with Two by Two Windows},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {76},
  number       = {2},
  pages        = {213--230},
  year         = {1996},
  url          = {https://doi.org/10.1006/jcta.1996.0102},
  doi          = {10.1006/JCTA.1996.0102},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jct/HurlbertMP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/MitchellC96,
  author       = {Chris J. Mitchell and
                  Liqun Chen},
  title        = {Comments on the {S/KEY} User Authentication Scheme},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {30},
  number       = {4},
  pages        = {12--16},
  year         = {1996},
  url          = {https://doi.org/10.1145/240799.240801},
  doi          = {10.1145/240799.240801},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/MitchellC96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MitchellEP96,
  author       = {Chris J. Mitchell and
                  Tuvi Etzion and
                  Kenneth G. Paterson},
  title        = {A method for constructing decodable de Bruijn sequences},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {42},
  number       = {5},
  pages        = {1472--1478},
  year         = {1996},
  url          = {https://doi.org/10.1109/18.532887},
  doi          = {10.1109/18.532887},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MitchellEP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenGM96,
  author       = {Liqun Chen and
                  Dieter Gollmann and
                  Chris J. Mitchell},
  editor       = {Josef Pieprzyk and
                  Jennifer Seberry},
  title        = {Tailoring authentication protocols to match underlying mechanisms},
  booktitle    = {Information Security and Privacy, First Australasian Conference, ACISP'96,
                  Wollongong, NSW, Australia, June 24-26, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1172},
  pages        = {121--133},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0023293},
  doi          = {10.1007/BFB0023293},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenGM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChenGM96,
  author       = {Liqun Chen and
                  Dieter Gollmann and
                  Chris J. Mitchell},
  editor       = {T. Mark A. Lomas},
  title        = {Key Escrow in Mutually Mistrusting Domains},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {139--153},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_14},
  doi          = {10.1007/3-540-62494-5\_14},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChenGM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChenGM95,
  author       = {Liqun Chen and
                  Dieter Gollmann and
                  Chris J. Mitchell},
  title        = {Distributing Trust Amongst Multiple Authentication Servers},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {255--268},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3403},
  doi          = {10.3233/JCS-1994/1995-3403},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ChenGM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Mitchell95,
  author       = {Chris J. Mitchell},
  title        = {Aperiodic and semi-periodic perfect maps},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {41},
  number       = {1},
  pages        = {88--95},
  year         = {1995},
  url          = {https://doi.org/10.1109/18.370116},
  doi          = {10.1109/18.370116},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Mitchell95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpa/JefferiesMW95,
  author       = {Nigel Jefferies and
                  Chris J. Mitchell and
                  Michael Walker},
  editor       = {Ed Dawson and
                  Jovan Dj. Golic},
  title        = {A Proposed Architecture for Trusted Third Party Services},
  booktitle    = {Cryptography: Policy and Algorithms, International Conference, Brisbane,
                  Queensland, Australia, July 3-5, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1029},
  pages        = {98--104},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0032349},
  doi          = {10.1007/BFB0032349},
  timestamp    = {Tue, 12 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cpa/JefferiesMW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChenGM95,
  author       = {Liqun Chen and
                  Dieter Gollmann and
                  Chris J. Mitchell},
  title        = {Key distribution without individual trusted authentification servers},
  booktitle    = {The Eighth {IEEE} Computer Security Foundations Workshop {(CSFW} '95),
                  March 13-15, 1995, Kenmare, County Kerry, Ireland},
  pages        = {30},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/CSFW.1995.518550},
  doi          = {10.1109/CSFW.1995.518550},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChenGM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/HanGM95,
  author       = {Yongfei Han and
                  Dieter Gollmann and
                  Chris J. Mitchell},
  editor       = {Colin Boyd},
  title        = {Minimal Weight k-SR Representations},
  booktitle    = {Cryptography and Coding, 5th {IMA} Conference, Cirencester, UK, December
                  18-20, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1025},
  pages        = {34--43},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60693-9\_6},
  doi          = {10.1007/3-540-60693-9\_6},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/HanGM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Mitchell95,
  author       = {Chris J. Mitchell},
  editor       = {Colin Boyd},
  title        = {A Storage Complexity Based Analogue of Maurer Key Establishment Using
                  Public Channels},
  booktitle    = {Cryptography and Coding, 5th {IMA} Conference, Cirencester, UK, December
                  18-20, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1025},
  pages        = {84--93},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60693-9\_11},
  doi          = {10.1007/3-540-60693-9\_11},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Mitchell95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MitchellP94,
  author       = {Chris J. Mitchell and
                  Kenneth G. Paterson},
  title        = {Decoding Perfect Maps},
  journal      = {Des. Codes Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {11--30},
  year         = {1994},
  url          = {https://doi.org/10.1007/BF01388557},
  doi          = {10.1007/BF01388557},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MitchellP94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Mitchell94,
  author       = {Chris J. Mitchell},
  title        = {Constructing c-ary Perfect Factors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {341--368},
  year         = {1994},
  url          = {https://doi.org/10.1007/BF01388650},
  doi          = {10.1007/BF01388650},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Mitchell94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/JedwabMPW94,
  author       = {Jonathan Jedwab and
                  Chris J. Mitchell and
                  Fred Piper and
                  Peter R. Wild},
  title        = {Perfect binary arrays and difference sets},
  journal      = {Discret. Math.},
  volume       = {125},
  number       = {1-3},
  pages        = {241--254},
  year         = {1994},
  url          = {https://doi.org/10.1016/0012-365X(94)90165-1},
  doi          = {10.1016/0012-365X(94)90165-1},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/JedwabMPW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/MitchellWW94,
  author       = {Chris J. Mitchell and
                  Michael Walker and
                  Peter R. Wild},
  title        = {The Combinatorics of Perfect Authentication Schemes},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {7},
  number       = {1},
  pages        = {102--107},
  year         = {1994},
  url          = {https://doi.org/10.1137/S0895480190178187},
  doi          = {10.1137/S0895480190178187},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/MitchellWW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BurnsM94,
  author       = {John Burns and
                  Chris J. Mitchell},
  title        = {Parameter Selection for Server-Aided {RSA} Computation Schemes},
  journal      = {{IEEE} Trans. Computers},
  volume       = {43},
  number       = {2},
  pages        = {163--174},
  year         = {1994},
  url          = {https://doi.org/10.1109/12.262121},
  doi          = {10.1109/12.262121},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/BurnsM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MitchellT93,
  author       = {Chris J. Mitchell and
                  Andy Thomas},
  title        = {Standardising Authentication Protocols Based on Public-Key Techniques},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  pages        = {23--36},
  year         = {1993},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MitchellT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Mitchell92,
  author       = {Chris J. Mitchell},
  title        = {Authenticating Multicast Internet Electronic Mail Messages Using a
                  Bidirectional {MAC} is Insecure},
  journal      = {{IEEE} Trans. Computers},
  volume       = {41},
  number       = {4},
  pages        = {505--507},
  year         = {1992},
  url          = {https://doi.org/10.1109/12.135563},
  doi          = {10.1109/12.135563},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Mitchell92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MitchellV91,
  author       = {Chris J. Mitchell and
                  Vijay Varadharajan},
  title        = {Modified forms of cipher block chaining},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {37--40},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90054-H},
  doi          = {10.1016/0167-4048(91)90054-H},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MitchellV91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/IAnsonM90,
  author       = {Colin I'Anson and
                  Chris J. Mitchell},
  title        = {Security defects in {CCITT} recommendation {X.509:} the directory
                  authentication framework},
  journal      = {Comput. Commun. Rev.},
  volume       = {20},
  number       = {2},
  pages        = {30--34},
  year         = {1990},
  url          = {https://doi.org/10.1145/378570.378623},
  doi          = {10.1145/378570.378623},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/IAnsonM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/MitchellRW90,
  author       = {Chris J. Mitchell and
                  Dave Rush and
                  Michael Walker},
  title        = {A Secure Messaging Architecture Implementing the {X.400-1988} Security
                  Features},
  journal      = {Comput. J.},
  volume       = {33},
  number       = {4},
  pages        = {290--295},
  year         = {1990},
  url          = {https://doi.org/10.1093/comjnl/33.4.290},
  doi          = {10.1093/COMJNL/33.4.290},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/MitchellRW90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BurnsM90,
  author       = {John Burns and
                  Chris J. Mitchell},
  title        = {A security scheme for resource sharing over a network},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {67--75},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90159-Q},
  doi          = {10.1016/0167-4048(90)90159-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BurnsM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Mitchell90,
  author       = {Chris J. Mitchell},
  title        = {Enumerating Boolean Functions of Cryptographic Significance},
  journal      = {J. Cryptol.},
  volume       = {2},
  number       = {3},
  pages        = {155--170},
  year         = {1990},
  url          = {https://doi.org/10.1007/BF00190802},
  doi          = {10.1007/BF00190802},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Mitchell90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GodlewskiM90,
  author       = {Philippe Godlewski and
                  Chris J. Mitchell},
  title        = {Key-Minimal Crytosystems for Unconditional Secrecy},
  journal      = {J. Cryptol.},
  volume       = {3},
  number       = {1},
  pages        = {1--25},
  year         = {1990},
  url          = {https://doi.org/10.1007/BF00203966},
  doi          = {10.1007/BF00203966},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GodlewskiM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Mitchell89,
  author       = {Chris J. Mitchell},
  title        = {Multi-Destination Secure Electronic Mail},
  journal      = {Comput. J.},
  volume       = {32},
  number       = {1},
  pages        = {13--15},
  year         = {1989},
  url          = {https://doi.org/10.1093/comjnl/32.1.13},
  doi          = {10.1093/COMJNL/32.1.13},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Mitchell89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Mitchell89a,
  author       = {Chris J. Mitchell},
  title        = {Another Postage Stamp Problem},
  journal      = {Comput. J.},
  volume       = {32},
  number       = {4},
  pages        = {374--376},
  year         = {1989},
  url          = {https://doi.org/10.1093/comjnl/32.4.374},
  doi          = {10.1093/COMJNL/32.4.374},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Mitchell89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MitchellRW89,
  author       = {Chris J. Mitchell and
                  Dave Rush and
                  Michael Walker},
  title        = {A remark on hash functions for message authentication},
  journal      = {Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {55--58},
  year         = {1989},
  url          = {https://doi.org/10.1016/0167-4048(89)90039-4},
  doi          = {10.1016/0167-4048(89)90039-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MitchellRW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/MitchellW89,
  author       = {Chris J. Mitchell and
                  Peter R. Wild},
  title        = {One-stage one-sided rearrangeable switching networks},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {37},
  number       = {1},
  pages        = {52--56},
  year         = {1989},
  url          = {https://doi.org/10.1109/26.21653},
  doi          = {10.1109/26.21653},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/MitchellW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GodlewskiM89,
  author       = {Philippe Godlewski and
                  Chris J. Mitchell},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {Key Minimal Authentication Systems for Unconditional Secrecy},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {497--501},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_48},
  doi          = {10.1007/3-540-46885-4\_48},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GodlewskiM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MitchellW88,
  author       = {Chris J. Mitchell and
                  Michael Walker},
  title        = {Solutions to the multidestination secure electronic mail problem},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {483--488},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90201-5},
  doi          = {10.1016/0167-4048(88)90201-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MitchellW88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/MitchellP88,
  author       = {Chris J. Mitchell and
                  Fred Piper},
  title        = {Key storage in secure networks},
  journal      = {Discret. Appl. Math.},
  volume       = {21},
  number       = {3},
  pages        = {215--228},
  year         = {1988},
  url          = {https://doi.org/10.1016/0166-218X(88)90068-6},
  doi          = {10.1016/0166-218X(88)90068-6},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/MitchellP88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MitchellP87,
  author       = {Chris J. Mitchell and
                  Fred Piper},
  title        = {The cost of reducing key-storage requirements in secure networks},
  journal      = {Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {339--341},
  year         = {1987},
  url          = {https://doi.org/10.1016/0167-4048(87)90069-1},
  doi          = {10.1016/0167-4048(87)90069-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MitchellP87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics