Search

Your search keyword '"Mitchell, Chris"' showing total 1,731 results

Search Constraints

Start Over You searched for: Author "Mitchell, Chris" Remove constraint Author: "Mitchell, Chris"
1,731 results on '"Mitchell, Chris"'

Search Results

1. Orientable sequences over non-binary alphabets

2. Integrity-protecting block cipher modes -- Untangling a tangled web

3. Extracting particle size distribution from laser speckle with a physics-enhanced autocorrelation-based estimator (PEACE)

5. Rivaroxaban for stroke patients with antiphospholipid syndrome (RISAPS): protocol for a randomized controlled, phase IIb proof-of-principle trial

7. Privacy-Preserving Biometric Matching Using Homomorphic Encryption

8. Constructing orientable sequences

10. Critical shortfalls in the management of PBC: Results of a UK-wide, population-based evaluation of care delivery

11. The (in)security of some recently proposed lightweight key distribution schemes

13. Two closely related insecure noninteractive group key establishment schemes

14. Provably insecure group authentication: Not all security proofs are what they claim to be

15. How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure

16. Who Needs Trust for 5G?

17. How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

18. Yet another insecure group key distribution scheme using secret sharing

21. The impact of quantum computing on real-world security: A 5G case study

26. On Defense Electronics, U.S. Just Past Square One

27. The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure

28. Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking

29. OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

30. The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure

31. Security issues in a group key establishment protocol

32. Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect

33. Web password recovery --- a necessary evil?

36. Provably Insecure Group Authentication: Not All Security Proofs are What they Claim to Be

37. Automating the Evaluation of Trustworthiness

38. AutoPass: An Automatic Password Generator

40. Post-quantum Certificates for Electronic Travel Documents

41. Password Generators: Old Ideas and New

42. Retrofitting mutual authentication to GSM using RAND hijacking

43. On the security of 2-key triple DES

46. Analysing the Security of Google's implementation of OpenID Connect

47. Improving Air Interface User Privacy in Mobile Telephony

48. Excavations at Redhouse, Adwick Le Street, Doncaster : Bronze Age, Iron Age and Roman Occupation

Catalog

Books, media, physical & digital resources