scispace - formally typeset
C

Chris J. Mitchell

Researcher at Royal Holloway, University of London

Publications -  408
Citations -  11842

Chris J. Mitchell is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Authentication & Cryptography. The author has an hindex of 48, co-authored 397 publications receiving 10982 citations. Previous affiliations of Chris J. Mitchell include Johns Hopkins University & University of Portland.

Papers
More filters
Journal ArticleDOI

Prediction of Gene Activity in Early B Cell Development Based on an Integrative Multi-Omics Analysis

TL;DR: It is demonstrated that active chromatin modifications at promoters are good indicators of transcription and steady state mRNA levels and post-transcriptional mechanisms and highlighted how this integrated multi-omics data set can be a useful resource in uncovering regulatory mechanisms.
Proceedings ArticleDOI

Using GSM/UMTS for single sign-on

TL;DR: An SSO protocol is proposed where a GSM or UMTS operator plays the role of the ASP and by which its subscribers can be authenticated to SPs without any user interaction and in a way that preserves the user's privacy and mobility.
Journal ArticleDOI

Memory for, and salience of, the unique features of similar stimuli in perceptual learning.

TL;DR: Exposure to complex checkerboards that consisted of small distinctive features superimposed on a larger common background enhanced the perceptual learning effect, which confirmed that the better encoding of the unique features during intermixed preex exposure is a direct cause of the enhanced discrimination observed following preexposure on this schedule.
Book ChapterDOI

Undetachable Threshold Signatures

TL;DR: The concept of an undetachable threshold signature scheme, which enables constrained signing power to be distributed across multiple agents, thus reducing the necessary trust in single agent platforms, is introduced.
Book ChapterDOI

Cryptanalysis of two variants of PCBC mode when used for message integrity

TL;DR: This paper cryptanalyse this mode of operation of PCBC, and shows that it possesses a serious weakness when used for data integrity protection, and describes a ciphertext-only existential forgery attack against another, recently proposed, PCBC-variant called M-PCBC.