C
Chris J. Mitchell
Researcher at Royal Holloway, University of London
Publications - 408
Citations - 11842
Chris J. Mitchell is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Authentication & Cryptography. The author has an hindex of 48, co-authored 397 publications receiving 10982 citations. Previous affiliations of Chris J. Mitchell include Johns Hopkins University & University of Portland.
Papers
More filters
Journal ArticleDOI
Prediction of Gene Activity in Early B Cell Development Based on an Integrative Multi-Omics Analysis
Mohammad Heydarian,Teresa Romeo Luperchio,Jevon Cutler,Chris J. Mitchell,Min-Sik Kim,Akhilesh Pandey,Barbara Sollner-Webb,Karen L. Reddy +7 more
TL;DR: It is demonstrated that active chromatin modifications at promoters are good indicators of transcription and steady state mRNA levels and post-transcriptional mechanisms and highlighted how this integrated multi-omics data set can be a useful resource in uncovering regulatory mechanisms.
Proceedings ArticleDOI
Using GSM/UMTS for single sign-on
TL;DR: An SSO protocol is proposed where a GSM or UMTS operator plays the role of the ASP and by which its subscribers can be authenticated to SPs without any user interaction and in a way that preserves the user's privacy and mobility.
Journal ArticleDOI
Memory for, and salience of, the unique features of similar stimuli in perceptual learning.
TL;DR: Exposure to complex checkerboards that consisted of small distinctive features superimposed on a larger common background enhanced the perceptual learning effect, which confirmed that the better encoding of the unique features during intermixed preex exposure is a direct cause of the enhanced discrimination observed following preexposure on this schedule.
Book ChapterDOI
Undetachable Threshold Signatures
TL;DR: The concept of an undetachable threshold signature scheme, which enables constrained signing power to be distributed across multiple agents, thus reducing the necessary trust in single agent platforms, is introduced.
Book ChapterDOI
Cryptanalysis of two variants of PCBC mode when used for message integrity
TL;DR: This paper cryptanalyse this mode of operation of PCBC, and shows that it possesses a serious weakness when used for data integrity protection, and describes a ciphertext-only existential forgery attack against another, recently proposed, PCBC-variant called M-PCBC.