Dynamic content attacks on digital signatures

Adil Alsaid , Chris J. Mitchell
Information Management & Computer Security 13 ( 4) 328 -336

26
2005
A pragmatic alternative to undetachable signatures

Niklas Borselius , Chris J. Mitchell , Aaron Wilson
Operating Systems Review 36 ( 2) 6 -11

8
2002
Error oracle attacks on CBC mode: is there a future for CBC mode encryption?

Chris J. Mitchell
international conference on information security 244 -258

18
2005
Security in Future Mobile Multimedia Networks

Chris J. Mitchell , Liqun Chen
Insights Into Mobile Multimedia Communications 177 -190

2
1999
De Bruijn Sequences and Perfect Factors

Chris J. Mitchell
SIAM Journal on Discrete Mathematics 10 ( 2) 270 -281

3
1997
Perfect Factors from Cyclic Codes and Interleaving

Chris J. Mitchell , Kenneth G. Paterson
SIAM Journal on Discrete Mathematics 11 ( 2) 241 -264

1
1998
Comments on a cryptographic key assignment scheme

Qiang Tang , Chris J. Mitchell
Computer Standards & Interfaces 27 ( 3) 323 -326

26
2005
Comments on two anonymous conference key distribution systems

Qiang Tang , Chris J. Mitchell
Computer Standards & Interfaces 27 ( 4) 397 -400

7
2005
Partial Key Recovery Attacks on XCBC, TMAC and OMAC

Chris J. Mitchell
Cryptography and Coding 155 -167

4
2005
Installing fake root keys in a PC

Adil Alsaid , Chris J. Mitchell
european public key infrastructure workshop 227 -239

8
2005
Interoperation between a conventional PKI and an ID-Based infrastructure

Geraint Price , Chris J. Mitchell
european public key infrastructure workshop 73 -85

10
2005
Password Generators: Old Ideas and New

Fatma Al Maqbali , Chris J. Mitchell
Information Security Theory and Practice 245 -253

5
2016
OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

Wanpeng Li , Chris J. Mitchell , Thomas Chen
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop 35 -44

21
2019
CardSpace-liberty integration for CardSpace users

Haitham S. Al-Sinani , Waleed A. Alrodhan , Chris J. Mitchell
identity and trust on the internet 12 -25

15
2010
Trusted Computing: Security and Applications

Eimear Gallery , Chris J. Mitchell
Cryptologia 33 ( 3) 217 -245

21
2009
Digital rights management using a mobile phone

Imad M. Abbadi , Chris J. Mitchell
international conference on electronic commerce 185 -194

28
2007
A universal client-based identity management tool

Haitham S. Al-Sinani , Chris J. Mitchell
european public key infrastructure workshop 49 -74

6
2011
Using EMV Cards to Protect E-commerce Transactions

Vorapranee Khu-Smith , Chris J. Mitchell
electronic commerce and web technologies 388 -399

12
2002
A fair certification protocol

Chris J. Mitchell , Konstantinos Rantos
ACM SIGCOMM Computer Communication Review 29 ( 3) 47 -49

1
1999
Making serial number based authentication robust against loss of state

Chris J. Mitchell
ACM SIGOPS Operating Systems Review 34 ( 3) 56 -59

20
2000