scispace - formally typeset
Search or ask a question
Author

Chris J. Mitchell

Bio: Chris J. Mitchell is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Authentication & Cryptography. The author has an hindex of 48, co-authored 397 publications receiving 10982 citations. Previous affiliations of Chris J. Mitchell include Johns Hopkins University & University of Portland.


Papers
More filters
Journal ArticleDOI
TL;DR: A security scheme for a special purpose resource-sharing system for networked computers making use of cryptographic constructs called coupons, issued by a central authority, and representing the right to use a certain amount of resources on a specified machine is described.

18 citations

Posted Content
TL;DR: A generalisation of the 1990 van Oorschot-Wiener attack is described in this article, constituting the first advance in cryptanalysis of 2-key triple DES since 1990.
Abstract: This paper reconsiders the security offered by 2-key triple DES, an encryption technique that remains widely used despite recently being de-standardised by NIST. A generalisation of the 1990 van Oorschot-Wiener attack is described, constituting the first advance in cryptanalysis of 2-key triple DES since 1990. We give further attack enhancements that together imply that the widely used estimate that 2-key triple DES provides 80 bits of security can no longer be regarded as conservative; the widely stated assertion that the scheme is secure as long as the key is changed regularly is also challenged. The main conclusion is that, whilst not completely broken, the margin of safety for 2-key triple DES is slim, and efforts to replace it, at least with its 3-key variant, should be pursued with some urgency.

17 citations

Journal ArticleDOI
TL;DR: Preexposure to intermixed presentations of a pair of similar stimuli facilitates subsequent discrimination between them, and exposure increases sensitivity to the spatial location of the features, a conclusion confirmed by analysis of eye gaze.
Abstract: Preexposure to intermixed presentations of a pair of similar stimuli (AX and BX, where A and B represent distinctive features, and X the features the stimuli hold in common) facilitates subsequent discrimination between them. This perceptual learning effect has been interpreted as indicating that the loss of effective salience resulting from repeated presentation of a stimulus is attenuated or reversed by a salience-modulation process that operates on the unique stimulus features A and B during intermixed preexposure. In 3 experiments, we examined discrimination after intermixed preexposure to AX and BX, making comparison with a condition in which novel unique features were added to the preexposed background (CX and DX). In all experiments, we also monitored eye gaze during both preexposure and the test. Experiments 1 and 2 found discrimination of the preexposed stimuli to be superior. This result cannot be explained by salience-modulation theories that suppose that intermixed preexposure merely attenuates loss of salience to the unique features A and B; it suggests, rather, that intermixed preexposure to AX and BX enhances the salience of, or attention paid to, the distinctive features. Experiment 3 demonstrated that exposure increases sensitivity to the spatial location of the features, a conclusion confirmed by analysis of eye gaze.

17 citations

Journal ArticleDOI
TL;DR: It is argued that the inhibition revealed in the causal judgement task reflects inferential reasoning, which relies, in part, on the ability of the cue in question to excite a representation of the outcome, as revealed in a categorization test.
Abstract: The associative view of human causal learning argues that causation is attributed to the extent that the putative cause activates, via an association, a mental representation of the effect. That is, causal learning is a human analogue of animal conditioning. We tested this associative theory using a task in which a fictitious character suffered from two allergic reactions, rash (O1) and headache (O2). In a conditioned inhibition design with each of these two outcomes (A–O1/AX– and B–O2/BY–), participants were trained that one herbal remedy (X) prevented O1 and that the other (Y) prevented O2. These inhibitory properties were revealed in a causal judgement summation test. In a subsequent categorization task, X was most easily categorized with O1, and Y with O2. Thus, the categorization data indicated an excitatory X–O1 and Y–O2 association, the reverse of the inhibitory relationship observed on the causal judgement measure. A second experiment showed that this pattern of excitation and inhibition is depend...

17 citations

Book ChapterDOI
18 Nov 2010
TL;DR: A novel scheme is proposed that allows Windows CardSpace to be used as a password manager, thereby improving the usability and security of password use as well as potentially encouraging CardSpace adoption.
Abstract: In this paper we propose a novel scheme that allows Windows CardSpace to be used as a password manager, thereby improving the usability and security of password use as well as potentially encouraging CardSpace adoption. Usernames and passwords are stored in personal cards, and these cards can be used to sign on transparently to corresponding websites. The scheme does not require any changes to login servers or to the CardSpace identity selector and, in particular, it does not require websites to support CardSpace. We describe how the scheme operates, and give details of a proof-of-concept prototype. Security and usability analyses are also provided.

17 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

28 Jul 2005
TL;DR: PfPMP1)与感染红细胞、树突状组胞以及胎盘的单个或多个受体作用,在黏附及免疫逃避中起关键的作�ly.
Abstract: 抗原变异可使得多种致病微生物易于逃避宿主免疫应答。表达在感染红细胞表面的恶性疟原虫红细胞表面蛋白1(PfPMP1)与感染红细胞、内皮细胞、树突状细胞以及胎盘的单个或多个受体作用,在黏附及免疫逃避中起关键的作用。每个单倍体基因组var基因家族编码约60种成员,通过启动转录不同的var基因变异体为抗原变异提供了分子基础。

18,940 citations

Book
01 Jan 1996
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Abstract: From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.

13,597 citations

Journal ArticleDOI
23 Jan 2015-Science
TL;DR: In this paper, a map of the human tissue proteome based on an integrated omics approach that involves quantitative transcriptomics at the tissue and organ level, combined with tissue microarray-based immunohistochemistry, to achieve spatial localization of proteins down to the single-cell level.
Abstract: Resolving the molecular details of proteome variation in the different tissues and organs of the human body will greatly increase our knowledge of human biology and disease. Here, we present a map of the human tissue proteome based on an integrated omics approach that involves quantitative transcriptomics at the tissue and organ level, combined with tissue microarray-based immunohistochemistry, to achieve spatial localization of proteins down to the single-cell level. Our tissue-based analysis detected more than 90% of the putative protein-coding genes. We used this approach to explore the human secretome, the membrane proteome, the druggable proteome, the cancer proteome, and the metabolic functions in 32 different tissues and organs. All the data are integrated in an interactive Web-based database that allows exploration of individual proteins, as well as navigation of global expression patterns, in all major tissues and organs in the human body.

9,745 citations

Book ChapterDOI
15 Aug 1999
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Abstract: Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. We also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.

6,757 citations