scispace - formally typeset
C

Chris J. Mitchell

Researcher at Royal Holloway, University of London

Publications -  408
Citations -  11842

Chris J. Mitchell is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Authentication & Cryptography. The author has an hindex of 48, co-authored 397 publications receiving 10982 citations. Previous affiliations of Chris J. Mitchell include Johns Hopkins University & University of Portland.

Papers
More filters
Journal ArticleDOI

The benefits of impossible tests: Assessing the role of error-correction in the pretesting effect

TL;DR: This article found that small, within category errors produced better recognition than large, cross-category errors, while participants correctly judged that their memory would be better after small than after large errors, but incorrectly believed that making any errors would be detrimental.
Book ChapterDOI

Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation

TL;DR: This paper investigates interoperability problems arising from the use of dissimilar key recovery mechanisms in encrypted communications and a protocol is proposed where two communicating entities can negotiate the key recovery mechanism(s) to be used.
Journal Article

Security protocols for biometrics-based cardholder authentication in smartcards

TL;DR: In this article, the authors proposed strategies to ensure integrity of the sensitive data exchanged between the smartcard and the card reader during authentication of the cardholder to the card, and also to provide mutual authentication between card and reader.

Spy Agents: Evaluating Trust in Remote Environments.

TL;DR: The spy agent framework developed here consists of a spy agent structural architecture that instruments and instantiates spy agents with appropriate content; a spying agent routing framework that fabricates and deploys the overall spying scenario with specialised spying routing protocols; and an evaluation entity that implements all the necessary security analysis mechanisms.