scispace - formally typeset
C

Chris J. Mitchell

Researcher at Royal Holloway, University of London

Publications -  408
Citations -  11842

Chris J. Mitchell is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Authentication & Cryptography. The author has an hindex of 48, co-authored 397 publications receiving 10982 citations. Previous affiliations of Chris J. Mitchell include Johns Hopkins University & University of Portland.

Papers
More filters
Journal ArticleDOI

A draft map of the human proteome

Min-Sik Kim, +73 more
- 29 May 2014 - 
TL;DR: A draft map of the human proteome is presented using high-resolution Fourier-transform mass spectrometry to discover a number of novel protein-coding regions, which includes translated pseudogenes, non-c coding RNAs and upstream open reading frames.
Journal ArticleDOI

The propositional nature of human associative learning.

TL;DR: It is argued that this new conceptual framework allows many of the important recent advances in associative learning research to be retained, but recast in a model that provides a firmer foundation for both immediate application and future research.
Book

Applications of seasonal climate forecasting in agricultural and natural ecosystems : the Australian experience

TL;DR: The importance of seasonal climate variability and seasonal forecasting to the Australian economy has been discussed in this paper, where seasonal climate forecasting has been used to forecast dryland crops in northern Australia.
Proceedings ArticleDOI

RFID authentication protocol for low-cost tags

TL;DR: This paper proposes a new authentication protocol which provides the identified privacy and security features and is also efficient and shows that it requires less tag-side storage and computation than other similarly structured RFID protocols.
Book ChapterDOI

A taxonomy of single sign-on systems

TL;DR: A taxonomy of SSO approaches is presented and some of the SSO schemes, services and products into that context enables decisions about the design and selection of future approaches to SSO to be made within a more structured context and reveals some important differences in the security properties that can be provided by various approaches.