C
Chris J. Mitchell
Researcher at Royal Holloway, University of London
Publications - 408
Citations - 11842
Chris J. Mitchell is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Authentication & Cryptography. The author has an hindex of 48, co-authored 397 publications receiving 10982 citations. Previous affiliations of Chris J. Mitchell include Johns Hopkins University & University of Portland.
Papers
More filters
Journal ArticleDOI
The benefits of impossible tests: Assessing the role of error-correction in the pretesting effect
TL;DR: This article found that small, within category errors produced better recognition than large, cross-category errors, while participants correctly judged that their memory would be better after small than after large errors, but incorrectly believed that making any errors would be detrimental.
Book ChapterDOI
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation
TL;DR: This paper investigates interoperability problems arising from the use of dissimilar key recovery mechanisms in encrypted communications and a protocol is proposed where two communicating entities can negotiate the key recovery mechanism(s) to be used.
Journal Article
Security protocols for biometrics-based cardholder authentication in smartcards
Luciano Rila,Chris J. Mitchell +1 more
TL;DR: In this article, the authors proposed strategies to ensure integrity of the sensitive data exchanged between the smartcard and the card reader during authentication of the cardholder to the card, and also to provide mutual authentication between card and reader.
Spy Agents: Evaluating Trust in Remote Environments.
TL;DR: The spy agent framework developed here consists of a spy agent structural architecture that instruments and instantiates spy agents with appropriate content; a spying agent routing framework that fabricates and deploys the overall spying scenario with specialised spying routing protocols; and an evaluation entity that implements all the necessary security analysis mechanisms.