Obserwuj
Chris Mitchell
Chris Mitchell
Professor of Computer Science, Royal Holloway, University of London
Zweryfikowany adres z rhul.ac.uk - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
RFID authentication protocol for low-cost tags
B Song, CJ Mitchell
Proceedings of the first ACM conference on Wireless network security, 140-147, 2008
3612008
A taxonomy of single sign-on systems
A Pashalidis, CJ Mitchell
Information Security and Privacy: 8th Australasian Conference, ACISP 2003 …, 2003
3032003
Manual authentication for wireless devices
C Gehrmann, CJ Mitchell, K Nyberg
RSA Cryptobytes 7 (1), 29-37, 2004
2932004
Key storage in secure networks
CJ Mitchell, FC Piper
Discrete applied mathematics 21 (3), 215-228, 1988
2791988
Trusted computing
C Mitchell
Iet, 2005
2582005
Scalable RFID security protocols supporting tag ownership transfer
B Song, CJ Mitchell
Computer Communications 34 (4), 556-566, 2011
1842011
Secure messaging systems
AD Marshall, CJ Mitchell, GJ Proudler
US Patent 4,888,800, 1989
1621989
Security vulnerabilities in DNS and DNSSEC
S Ariyapperuma, CJ Mitchell
The Second International Conference on Availability, Reliability and …, 2007
1542007
Authentication protocols for mobile network environment value-added services
G Horn, KM Martin, CJ Mitchell
IEEE Transactions on Vehicular Technology 51 (2), 383-392, 2002
1462002
Comments on the S/KEY user authentication scheme
CJ Mitchell, L Chen
ACM SIGOPS Operating Systems Review 30 (4), 12-16, 1996
1421996
A proposed architecture for trusted third party services
N Jefferies, C Mitchell, M Walker
Cryptography: Policy and Algorithms: International Conference Brisbane …, 1996
1421996
Data authentication and protection system
AD Marshall, CJ Mitchell, GJ Proudler
US Patent 4,933,969, 1990
1311990
Key control in key agreement protocols
CJ Mitchell, M Ward, P Wilson
Electronics Letters 34 (10), 980-980, 1998
1301998
Enumerating Boolean functions of cryptographic significance
C Mitchell
Journal of cryptology 2, 155-170, 1990
1191990
Minimum weight modified signed-digit representations and fast exponentiation
J Jedwab, CJ Mitchell
Electronics Letters 17 (25), 1171-1172, 1989
1191989
User's guide to cryptography and standards
A Dent, C Mitchell
Artech, 2004
992004
Security issues in OAuth 2.0 SSO implementations
W Li, CJ Mitchell
International Conference on Information Security, 529-541, 2014
912014
Security vulnerabilities in ad hoc networks
PW Yau, CJ Mitchell
Proceedings of the 7th International Symposium on Communication Theory and …, 2003
902003
Reputation methods for routing security for mobile ad hoc networks
PW Yau, CJ Mitchell
SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in …, 2003
882003
Analysing the Security of Google’s implementation of OpenID Connect
W Li, CJ Mitchell
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
872016
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20