The impact of quantum computing on real-world security: A 5G case study

Chris J. Mitchell
Computers & Security 93 101825

2020
Challenges for Trusted Computing

Shane Balfe , Eimear Gallery , Chris J. Mitchell , Kenneth G. Paterson
ieee symposium on security and privacy 6 ( 6) 60 -66

27
2008
Key storage in secure networks

Chris J. Mitchell , Fred C. Piper
Discrete Applied Mathematics 21 ( 3) 215 -228

272
1988
Modified forms of cipher block chaining

Chris J. Mitchell , Vijay Varadharajan
Computers & Security 10 ( 1) 37 -40

2
1991
A security scheme for resource sharing over a network

John Burns , Chris J. Mitchell
Computers & Security 9 ( 1) 67 -75

16
1990
Partial Key Recovery Attack Against RMAC

Lars R. Knudsen , Chris J. Mitchell
Journal of Cryptology 18 ( 4) 375 -389

6
2005
Building General Purpose Security Services on Trusted Computing

Chunhua Chen , Chris J. Mitchell , Shaohua Tang
Trusted Systems 16 -31

2
2012
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards

Luciano Rila , Chris J. Mitchell
applied cryptography and network security 254 -264

16
2003
A Secure Electronic Payment Scheme for Charity Donations

Mansour A. Al-Meaither , Chris J. Mitchell
E-Commerce and Web Technologies 50 -61

2
2003
Enhancing E-commerce Security Using GSM Authentication

Vorapranee Khu-smith , Chris J. Mitchell
E-Commerce and Web Technologies 72 -83

10
2003
Decoding perfect maps

Chris J. Mitchell , Kenneth G. Paterson
Designs, Codes and Cryptography 4 ( 1) 11 -30

18
1994
Constructing c -ary perfect factors

Chris J. Mitchell
Designs, Codes and Cryptography 4 ( 4) 341 -368

8
1994
Extending the Scope of cardspace

Haitham S. Al-Sinani , Chris J. Mitchell
security of information and networks 235 -238

4
2011
Scalable RFID Pseudonym Protocol

Boyeon Song , Chris J. Mitchell
network and system security 216 -224

23
2009
Secret sharing with reusable polynomials

Liqun Chen , Dieter Gollmann , Chris J. Mitchell , Peter Wild
Information Security and Privacy 183 -193

30
1997
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

Wanpeng Li , Chris J. Mitchell , Thomas Chen
international workshop on security 24 -41

3
2018
Cryptanalysis of the EPBC authenticated encryption mode

Chris J. Mitchell
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding 118 -128

2
2007
A taxonomy of single sign-on systems

Andreas Pashalidis , Chris J. Mitchell
australasian conference on information security and privacy 249 -264

296
2003
Using EMV Cards for Single Sign-On

Andreas Pashalidis , Chris J. Mitchell
Public Key Infrastructure 205 -217

8
2004
Efficient Compilers for Authenticated Group Key Exchange

Qiang Tang , Chris J. Mitchell
Computational Intelligence and Security 192 -197

4
2005