scispace - formally typeset
Search or ask a question
Author

Chris J. Mitchell

Bio: Chris J. Mitchell is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Authentication & Cryptography. The author has an hindex of 48, co-authored 397 publications receiving 10982 citations. Previous affiliations of Chris J. Mitchell include Johns Hopkins University & University of Portland.


Papers
More filters
Journal ArticleDOI
TL;DR: The evidence from the recall measure suggests that forward blocking in this task results from a failure to encode the B–outcome relationship during training, and Associative and nonassociative mechanisms of forward blocking are discussed.
Abstract: In two “allergist” causal judgement experiments, participants were trained with a blocking design (A + |AB+). The procedure allowed different food cues to be paired with different fictitious allergic reactions. On test, participants were asked to rate the causal efficacy of the target cues and to recall the particular allergic reaction (outcome) that had followed each cue during training. Forward blocking was observed on the causal judgement measure and on the outcome recall measure in both Experiment 1 and Experiment 2. A backward blocking contingency was also trained in Experiment 2 (AB + |A+). Backward blocking was not observed either on the causal judgement or on the outcome recall measure. The evidence from the recall measure suggests that forward blocking in this task results from a failure to encode the B–outcome relationship during training. Associative and nonassociative mechanisms of forward blocking are discussed.

32 citations

Journal ArticleDOI
TL;DR: Four experiments examined the role of selective attention in a new causal judgment task that allowed measurement of both causal strength and cue recognition, and a new model, based on N. J. Mackintosh's (1975) model, is proposed to account for the observed relationship between the extent to which each cue is attended to, learned about, and later recognized.
Abstract: Four experiments examined the role of selective attention in a new causal judgment task that allowed measurement of both causal strength and cue recognition. In Experiments 1 and 2, blocking was observed; pretraining with 1 cue (A) resulted in reduced learning about a 2nd cue (B) when those 2 cues were trained in compound (AB+). Participants also demonstrated decreased recognition performance for the causally redundant Cue B, suggesting that less attention had been paid to it in training. This is consistent with the idea that attention is preferentially allocated toward the more predictive Cue A, and away from the less predictive Cue B (e.g., N. J. Mackintosh, 1975). Contrary to this hypothesis, in Experiments 3 and 4, participants demonstrated poorer recognition for the most predictive cues, relative to control cues. A new model, which is based on N. J. Mackintosh's (1975) model, is proposed to account for the observed relationship between the extent to which each cue is attended to, learned about, and later recognized

32 citations

Journal ArticleDOI
TL;DR: Three experiments examined the phenomenon of cue-elicited response choice in an outcome-selective Pavlovian-instrumental transfer design and an outcome devaluation procedure, supporting a goal-directed model of PIT in which expected outcome probability and value make independent contributions to response choice.
Abstract: Cues that signal rewards can motivate reward-seeking behaviors, even for outcomes that are not currently desired. Three experiments examined this phenomenon, using an outcome-selective Pavlovian-instrumental transfer (PIT) design and an outcome devaluation procedure. In Experiment 1, participants learned to perform one response to earn crisps points and another response to earn popcorn points. One outcome was then devalued by adulterating it to make it taste unpleasant. On test, overall response choice was biased toward the outcome that had not been devalued, indicating goal-directed control. Stimuli that signaled crisps and popcorn also biased instrumental response choice toward their respective outcomes (a PIT effect). Most importantly, the strength of this bias was not influenced by the devaluation manipulation. In contrast, Experiment 2 demonstrated that when stimuli signaled equal probability of the two outcomes, cue-elicited response choice was sensitive to the devaluation manipulation. Experiment 3 confirmed this conclusion by demonstrating a selective avoidance of the cued, devalued outcome. Together, these data support a goal-directed model of PIT in which expected outcome probability and value make independent contributions to response choice. (PsycINFO Database Record

31 citations

Journal ArticleDOI
TL;DR: The main objective of this paper is to highlight some of the major security and application issues confronting trusted computing technology, present in a large proportion of new PCs and incorporating a wide range of cryptographic functionality.
Abstract: The main objective of this paper is to highlight some of the major security and application issues confronting trusted computing technology. This technology—now present in a large proportion of new PCs and incorporating a wide range of cryptographic functionality—has the potential to have a major practical impact, but it has not been widely discussed. This paper is an attempt to encourage greater debate about this technology and its possible implications. Following a brief introduction to the history of trusted computing, we provide a summary of its main features. This leads naturally to a consideration of the issues that may impede its use, including potential problems with its cryptographic components. Possible applications of the technology are then discussed.

31 citations

Proceedings ArticleDOI
19 Oct 2009
TL;DR: This paper proposes a novel RFID authentication protocol based on the Song-Mitchell protocol, that takes O(1) work to authenticate a tag, and meets the privacy, security and performance requirements identified here.
Abstract: In this paper we address the issue of scalability in RFID pseudonym protocols Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag Some RFID protocols, however, only require constant time for tag identification, but, unfortunately, all previously proposed schemes of this type have serious shortcomings We propose a novel RFID authentication protocol based on the Song-Mitchell protocol, that takes O(1) work to authenticate a tag, and meets the privacy, security and performance requirements identified here The proposed scheme also supports tag delegation and ownership transfer in an efficient way

31 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

28 Jul 2005
TL;DR: PfPMP1)与感染红细胞、树突状组胞以及胎盘的单个或多个受体作用,在黏附及免疫逃避中起关键的作�ly.
Abstract: 抗原变异可使得多种致病微生物易于逃避宿主免疫应答。表达在感染红细胞表面的恶性疟原虫红细胞表面蛋白1(PfPMP1)与感染红细胞、内皮细胞、树突状细胞以及胎盘的单个或多个受体作用,在黏附及免疫逃避中起关键的作用。每个单倍体基因组var基因家族编码约60种成员,通过启动转录不同的var基因变异体为抗原变异提供了分子基础。

18,940 citations

Book
01 Jan 1996
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Abstract: From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.

13,597 citations

Journal ArticleDOI
23 Jan 2015-Science
TL;DR: In this paper, a map of the human tissue proteome based on an integrated omics approach that involves quantitative transcriptomics at the tissue and organ level, combined with tissue microarray-based immunohistochemistry, to achieve spatial localization of proteins down to the single-cell level.
Abstract: Resolving the molecular details of proteome variation in the different tissues and organs of the human body will greatly increase our knowledge of human biology and disease. Here, we present a map of the human tissue proteome based on an integrated omics approach that involves quantitative transcriptomics at the tissue and organ level, combined with tissue microarray-based immunohistochemistry, to achieve spatial localization of proteins down to the single-cell level. Our tissue-based analysis detected more than 90% of the putative protein-coding genes. We used this approach to explore the human secretome, the membrane proteome, the druggable proteome, the cancer proteome, and the metabolic functions in 32 different tissues and organs. All the data are integrated in an interactive Web-based database that allows exploration of individual proteins, as well as navigation of global expression patterns, in all major tissues and organs in the human body.

9,745 citations

Book ChapterDOI
15 Aug 1999
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Abstract: Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. We also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.

6,757 citations