RFID authentication protocol for low-cost tags B Song, CJ Mitchell Proceedings of the first ACM conference on Wireless network security, 140-147, 2008 | 359 | 2008 |
A taxonomy of single sign-on systems A Pashalidis, CJ Mitchell Information Security and Privacy: 8th Australasian Conference, ACISP 2003 …, 2003 | 302 | 2003 |
Manual authentication for wireless devices C Gehrmann, CJ Mitchell, K Nyberg RSA Cryptobytes 7 (1), 29-37, 2004 | 291 | 2004 |
Key storage in secure networks CJ Mitchell, FC Piper Discrete applied mathematics 21 (3), 215-228, 1988 | 277 | 1988 |
Trusted computing C Mitchell Iet, 2005 | 256 | 2005 |
Scalable RFID security protocols supporting tag ownership transfer B Song, CJ Mitchell Computer Communications 34 (4), 556-566, 2011 | 184 | 2011 |
Secure messaging systems AD Marshall, CJ Mitchell, GJ Proudler US Patent 4,888,800, 1989 | 162 | 1989 |
Security vulnerabilities in DNS and DNSSEC S Ariyapperuma, CJ Mitchell The Second International Conference on Availability, Reliability and …, 2007 | 148 | 2007 |
Authentication protocols for mobile network environment value-added services G Horn, KM Martin, CJ Mitchell IEEE Transactions on Vehicular Technology 51 (2), 383-392, 2002 | 146 | 2002 |
Comments on the S/KEY user authentication scheme CJ Mitchell, L Chen ACM SIGOPS Operating Systems Review 30 (4), 12-16, 1996 | 142 | 1996 |
A proposed architecture for trusted third party services N Jefferies, C Mitchell, M Walker Cryptography: Policy and Algorithms: International Conference Brisbane …, 1996 | 141 | 1996 |
Data authentication and protection system AD Marshall, CJ Mitchell, GJ Proudler US Patent 4,933,969, 1990 | 131 | 1990 |
Key control in key agreement protocols CJ Mitchell, M Ward, P Wilson Electronics Letters 34 (10), 980-980, 1998 | 130 | 1998 |
Enumerating Boolean functions of cryptographic significance C Mitchell Journal of cryptology 2, 155-170, 1990 | 119 | 1990 |
Minimum weight modified signed-digit representations and fast exponentiation J Jedwab, CJ Mitchell Electronics Letters 17 (25), 1171-1172, 1989 | 117 | 1989 |
User's guide to cryptography and standards A Dent, C Mitchell Artech, 2004 | 99 | 2004 |
Security vulnerabilities in ad hoc networks PW Yau, CJ Mitchell Proceedings of the 7th International Symposium on Communication Theory and …, 2003 | 90 | 2003 |
Reputation methods for routing security for mobile ad hoc networks PW Yau, CJ Mitchell SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in …, 2003 | 88 | 2003 |
Analysing the Security of Google’s implementation of OpenID Connect W Li, CJ Mitchell Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016 | 86 | 2016 |
Security issues in OAuth 2.0 SSO implementations W Li, CJ Mitchell International Conference on Information Security, 529-541, 2014 | 85 | 2014 |