scispace - formally typeset
C

Chris J. Mitchell

Researcher at Royal Holloway, University of London

Publications -  408
Citations -  11842

Chris J. Mitchell is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Authentication & Cryptography. The author has an hindex of 48, co-authored 397 publications receiving 10982 citations. Previous affiliations of Chris J. Mitchell include Johns Hopkins University & University of Portland.

Papers
More filters
Journal ArticleDOI

Cryptanalysis of a hybrid authentication protocol for large mobile networks

TL;DR: A hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks, which is used depending on whether the user and the request service are located in the same domain and suffers from a number of security vulnerabilities.
Journal ArticleDOI

Phospholipase C-gamma mediates the hydrolysis of phosphatidylinositol, but not of phosphatidylinositol 4,5-bisphoshate, in carbamylcholine-stimulated islets of langerhans.

TL;DR: The results indicate that the hydrolysis of PtdIns and PtdinsP2 are independently regulated in pancreatic islets and that PLCγ1 selectively mediates the breakdown of PTDIns.
Journal Article

Evidence for selective coupling of alpha1-adrenergic receptors to phospholipase C-beta1 in rat neonatal cardiomyocytes

TL;DR: Evidence is provided that NE-stimulated InsP generation in NCM is primarily mediated by PLC-beta(1), despite the presence of both P LC- beta(1) and PLC -beta(3) isoforms.
Book ChapterDOI

Another Look at Privacy Threats in 3G Mobile Telephony

TL;DR: This analysis reveals that the proposed modifications of 3G mobile phone security are impractical in a variety of ways; not only are there security and implementation issues, but the necessary changes to the operation of the system are very significant and much greater than is envisaged.

On the security of XCBC, TMAC and OMAC

TL;DR: The security provided by the XCBC, TMAC and OMAC schemes is analysed and compared with other MAC schemes and it is implied that there is relatively little to be gained practically through the introduction of these schemes by comparison with other well-established MAC functions.