scispace - formally typeset
Search or ask a question
Author

Chris J. Mitchell

Bio: Chris J. Mitchell is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Authentication & Cryptography. The author has an hindex of 48, co-authored 397 publications receiving 10982 citations. Previous affiliations of Chris J. Mitchell include Johns Hopkins University & University of Portland.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, Matkovich et al. showed that activation of PLC in neonatal rat cardiomyocytes (NCM) generates primarily inositol 1,4,5-trisphosphate (Ins(1, 4,5)P3) in response to rises in intracellular Ca2+, or inositolic 1, 4-bisphosphates (Ins (1,4)P2), and showed that PLC-δ1 overexpression selectively reduced NE-induced [3H]inositol phosphate (

51 citations

Book ChapterDOI
07 Jul 2016
TL;DR: A large-scale practical study of Google's implementation of OpenID Connect, involving forensic examination of 103 RP websites supporting it, reveals widespread serious vulnerabilities, many allowing an attacker to log in to an RP website as a victim user.
Abstract: Many millions of users routinely use Google to log ini¾?to relying party RP websites supporting Google's OpenID Connect service. OpenID Connect builds an identity layer on top of the OAuth 2.0 protocol, which has itself been widely adopted to support identity management. OpenID Connect allows an RP to obtain authentication assurances regarding an end user. A number of authors have analysed OAuth 2.0 security, but whether OpenID Connect is secure in practice remains an open question. We report on a large-scale practical study of Google's implementation of OpenID Connect, involving forensic examination of 103 RP websites supporting it. Our study reveals widespread serious vulnerabilities of a number of types, many allowing an attacker to log ini¾?to an RP website as a victim user. These issues appear to be caused by a combination of Google's design of its OpenID Connect service and RP developers making design decisions sacrificing security for ease of implementation. We give practical recommendations for both RPs and OPs to help improve the security of real world OpenID Connect systems.

50 citations

Journal ArticleDOI
TL;DR: The effects obtained with humans engage mechanisms additional to those seen in animals but it is argued that, for the most part, these have their basis in learning processes that are common to animals and people.
Abstract: We present a review of recent studies of perceptual learning conducted with nonhuman animals. The focus of this research has been to elucidate the mechanisms by which mere exposure to a pair of similar stimuli can increase the ease with which those stimuli are discriminated. These studies establish an important role for 2 mechanisms, one involving inhibitory associations between the unique features of the stimuli, the other involving a long-term habituation process that enhances the relative salience of these features. We then examine recent work investigating equivalent perceptual learning procedures with human participants. Our aim is to determine the extent to which the phenomena exhibited by people are susceptible to explanation in terms of the mechanisms revealed by the animal studies. Although we find no evidence that associative inhibition contributes to the perceptual learning effect in humans, initial detection of unique features (those that allow discrimination between 2 similar stimuli) appears to depend on an habituation process. Once the unique features have been detected, a tendency to attend to those features and to learn about their properties enhances subsequent discrimination. We conclude that the effects obtained with humans engage mechanisms additional to those seen in animals but argue that, for the most part, these have their basis in learning processes that are common to animals and people. In a final section, we discuss some implications of this analysis of perceptual learning for other aspects of experimental psychology and consider some potential applications.

50 citations

Journal ArticleDOI
TL;DR: The results indicated an important role for top-down strategic attentional processes in the learned predictiveness task, and no evidence for an automatic attentional bias was found.
Abstract: Cues that reliably predict an outcome in an initial phase of training (Phase 1) are learned faster in a second phase of training (Phase 2) than cues that were unreliable in Phase 1. This result is observed despite objectively equal relationships between the cues and the outcomes in Phase 2, and consequently constitutes a nonnormative bias in learning. The present experiments sought to confirm that this learned predictiveness effect is the product of attentional processes (Experiment 1), and to test further whether these processes are under voluntary control or are automatic in nature (Experiment 2). In addition to the usual outcome prediction measure, eye-gaze behavior was also monitored. The results indicated an important role for top-down strategic attentional processes in the learned predictiveness task. In contrast, no evidence for an automatic attentional bias was found.

49 citations

Journal ArticleDOI
01 Apr 2013-Leukemia
TL;DR: Quiescent leukaemic cells account for minimal residual disease in childhood lymphoblastic leukaemia and are a major source of uncertainty in prognosis for these patients.
Abstract: Quiescent leukaemic cells account for minimal residual disease in childhood lymphoblastic leukaemia

47 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

28 Jul 2005
TL;DR: PfPMP1)与感染红细胞、树突状组胞以及胎盘的单个或多个受体作用,在黏附及免疫逃避中起关键的作�ly.
Abstract: 抗原变异可使得多种致病微生物易于逃避宿主免疫应答。表达在感染红细胞表面的恶性疟原虫红细胞表面蛋白1(PfPMP1)与感染红细胞、内皮细胞、树突状细胞以及胎盘的单个或多个受体作用,在黏附及免疫逃避中起关键的作用。每个单倍体基因组var基因家族编码约60种成员,通过启动转录不同的var基因变异体为抗原变异提供了分子基础。

18,940 citations

Book
01 Jan 1996
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Abstract: From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.

13,597 citations

Journal ArticleDOI
23 Jan 2015-Science
TL;DR: In this paper, a map of the human tissue proteome based on an integrated omics approach that involves quantitative transcriptomics at the tissue and organ level, combined with tissue microarray-based immunohistochemistry, to achieve spatial localization of proteins down to the single-cell level.
Abstract: Resolving the molecular details of proteome variation in the different tissues and organs of the human body will greatly increase our knowledge of human biology and disease. Here, we present a map of the human tissue proteome based on an integrated omics approach that involves quantitative transcriptomics at the tissue and organ level, combined with tissue microarray-based immunohistochemistry, to achieve spatial localization of proteins down to the single-cell level. Our tissue-based analysis detected more than 90% of the putative protein-coding genes. We used this approach to explore the human secretome, the membrane proteome, the druggable proteome, the cancer proteome, and the metabolic functions in 32 different tissues and organs. All the data are integrated in an interactive Web-based database that allows exploration of individual proteins, as well as navigation of global expression patterns, in all major tissues and organs in the human body.

9,745 citations

Book ChapterDOI
15 Aug 1999
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Abstract: Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. We also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.

6,757 citations