59 resultados para key replacement attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction: Immunomodulators are agents, which can modulate the immune response to specific antigens, while causing least toxicity to the host system. Being part of the modern vaccine formulations, these compounds have contributed remarkably to the field of therapeutics. Despite the successful record maintained by these agents, the requirement of novel immunomodulators keeps increasing due to the increasing severity of diseases. Hence, research regarding the same holds great importance. Areas covered: In this review, we discuss the role of immunomodulators in improving performance of various vaccines used for counteracting most threatening infectious diseases, mechanisms behind their action and criteria for development of novel immunomodulators. Expert opinion: Understanding the molecular mechanisms underlying immune response is a prerequisite for development of effective therapeutics as these are often exploited by pathogens for their own propagation. Keeping this in mind, the present research in the field of immunotherapy focuses on developing immunomodulators that would not only enhance the protection against pathogen, but also generate a long-term memory response. With the introduction of advanced formulations including combination of different kinds of immunomodulators, one can expect tremendous success in near future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key aspects of Organic Photovoltaics (OPVs) have been reviewed in this tutorial. Issues pertaining to the choice of materials, fabrication processes, photophysical mechanisms, device characterization, morphology of active layers and manufacturing are discussed. Special emphasis has been given to recent developments in large-area modules. Current strategies in enhancing the performance using external optical engineering approaches have also been highlighted. OPVs as a technology combine low weight, flexibility, low cost, good form factor and high-throughput processing; making them a promising PV technology for the future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Blends of bromo-terminated polystyrene (PS-Br) and poly(vinyl methylether) (PVME) exhibit lower critical solution temperatures. In this study, PS-Br was designed by atom transfer radical polymerization and was converted to thiol-capped polystyrene (PS-SH) by reacting with thiourea. The silver nanoparticles (nAg) were then decorated with covalently bound PS-SH macromolecules to improve the phase miscibility in the PS-Br-PVME blends. Thermally induced demixing in this model blend was followed in the presence of polystyrene immobilized silver nanoparticles (PS-g-nAg). The graft density of the PS macromolecules was estimated to be ca. 0.78 chains per nm(2). Although the matrix and the grafted molecular weights were similar, PS-g-nAg particles were expelled from the PS phase and were localized in the PVME phase of the blends. This was addressed with respect to intermediate graft density and favourable PS-PVME contacts from microscopic interactions point of view. Interestingly, blends with 0.5 wt% PS-g-nAg delayed the spinodal decomposition temperature in the blends by ca. 18 degrees C with respect to the control blends. The scale of cooperativity, as determined by differential scanning calorimetry, increased only marginally in the case of PS-g-nAg; however, it increased significantly in the presence of bare nAg particles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Communication complexity refers to the minimum rate of public communication required for generating a maximal-rate secret key (SK) in the multiterminal source model of Csiszar and Narayan. Tyagi recently characterized this communication complexity for a two-terminal system. We extend the ideas in Tyagi's work to derive a lower bound on communication complexity in the general multiterminal setting. In the important special case of the complete graph pairwise independent network (PIN) model, our bound allows us to determine the exact linear communication complexity, i.e., the communication complexity when the communication and SK are restricted to be linear functions of the randomness available at the terminals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

User authentication is essential for accessing computing resources, network resources, email accounts, online portals etc. To authenticate a user, system stores user credentials (user id and password pair) in system. It has been an interested field problem to discover user password from a system and similarly protecting them against any such possible attack. In this work we show that passwords are still vulnerable to hash chain based and efficient dictionary attacks. Human generated passwords use some identifiable patterns. We have analysed a sample of 19 million passwords, of different lengths, available online and studied the distribution of the symbols in the password strings. We show that the distribution of symbols in user passwords is affected by the native language of the user. From symbol distributions we can build smart and efficient dictionaries, which are smaller in size and their coverage of plausible passwords from Key-space is large. These smart dictionaries make dictionary based attacks practical.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nitric oxide ( NO) has been shown to be effective in cancer chemoprevention and therefore drugs that help generate NO would be preferable for combination chemotherapy or solo use. This study shows a new evidence of NO as a mediator of acute leukemia cell death induced by fisetin, a promising chemotherapeutic agent. Fisetin was able to kill THP-1 cells in vivo resulting in tumor shrinkage in the mouse xenograft model. Death induction in vitro was mediated by an increase in NO resulting in double strand DNA breaks and the activation of both the extrinsic and the intrinsic apoptotic pathways. Double strand DNA breaks could be reduced if NO inhibitor was present during fisetin treatment. Fisetin also inhibited the downstream components of the mTORC1 pathway through downregulation of levels of p70 S6 kinase and inducing hypo-phosphorylation of S6 Ri P kinase, eIF4B and eEF2K. NO inhibition restored phosphorylation of downstream effectors of mTORC1 and rescued cells from death. Fisetin induced Ca2+ entry through L-type Ca2+ channels and abrogation of Ca2+ influx reduced caspase activation and cell death. NO increase and increased Ca2+ were independent phenomenon. It was inferred that apoptotic death of acute monocytic leukemia cells was induced by fisetin through increased generation of NO and elevated Ca2+ entry activating the caspase dependent apoptotic pathways. Therefore, manipulation of NO production could be viewed as a potential strategy to increase efficacy of chemotherapy in acute monocytic leukemia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the volume of data relating to proteins increases, researchers rely more and more on the analysis of published data, thus increasing the importance of good access to these data that vary from the supplemental material of individual articles, all the way to major reference databases with professional staff and long-term funding. Specialist protein resources fill an important middle ground, providing interactive web interfaces to their databases for a focused topic or family of proteins, using specialized approaches that are not feasible in the major reference databases. Many are labors of love, run by a single lab with little or no dedicated funding and there are many challenges to building and maintaining them. This perspective arose from a meeting of several specialist protein resources and major reference databases held at the Wellcome Trust Genome Campus (Cambridge, UK) on August 11 and 12, 2014. During this meeting some common key challenges involved in creating and maintaining such resources were discussed, along with various approaches to address them. In laying out these challenges, we aim to inform users about how these issues impact our resources and illustrate ways in which our working together could enhance their accuracy, currency, and overall value. Proteins 2015; 83:1005-1013. (c) 2015 The Authors. Proteins: Structure, Function, and Bioinformatics Published by Wiley Periodicals, Inc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Methylenetetrahydrofolate dehydrogenase-cyclohydrolase (FolD) catalyzes interconversion of 5,10-methylene-tetrahydrofolate and 10-formyl-tetrahydrofolate in the one-carbon metabolic pathway. In some organisms, the essential requirement of 10-formyl-tetrahydrofolate may also be fulfilled by formyltetrahydrofolate synthetase (Fhs). Recently, we developed an Escherichia coli strain in which the folD gene was deleted in the presence of Clostridium perfringens fhs (E. coli Delta folD/p-fhs) and used it to purify FolD mutants (free from the host-encoded FolD) and determine their biological activities. Mutations in the key residues of E. coli FolD, as identified from three-dimensional structures (D121A, Q98K, K54S, Y50S, and R191E), and a genetic screen (G122D and C58Y) were generated, and the mutant proteins were purified to determine their kinetic constants. Except for the R191E and K54S mutants, others were highly compromised in terms of both dehydrogenase and cyclohydrolase activities. While the R191E mutant showed high cyclohydrolase activity, it retained only a residual dehydrogenase activity. On the other hand, the K54S mutant lacked the cyclohydrolase activity but possessed high dehydrogenase activity. The D121A and G122D (in a loop between two helices) mutants were highly compromised in terms of both dehydrogenase and cyclohydrolase activities. In vivo and in vitro characterization of wild-type and mutant (R191E, G122D, D121A, Q98K, C58Y, K54S, and Y50S) FolD together with three-dimensional modeling has allowed us to develop a better understanding of the mechanism for substrate binding and catalysis by E. coli FolD.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Diaminopropionate ammonialyase (DAPAL), a fold-typeII pyridoxal 5-phosphate-dependent enzyme, catalyzes the ,-elimination of diaminopropionate (DAP) to pyruvate and ammonia. DAPAL was able to utilize both d- and l-DAP as substrates with almost equal efficiency. Mutational analysis of functionally important residues such as Thr385, Asp125 and Asp194 was carried out to understand the mechanism by which the isomers are hydrolyzed. Further, the putative residues involved in the formation of disulfide bond Cys271 and Cys299 were also mutated. T385S, T385D sDAPAL were as active with dl-DAP as substrate as sDAPAL, whereas the later exhibited a threefold increase in catalytic efficiency with d-Ser as substrate. Further analysis of these mutants suggested that DAPAL might follow an anti-E-2 mechanism of catalysis that does not involve the formation of a quinonoid intermediate. Of the two mutants of Asp125, D125E showed complete loss of activity with d-DAP as substrate, whereas the reaction with l-DAP was not affected significantly, demonstrating that Asp125 was essential for abstraction of protons from the d-isomer. By contrast, mutational analysis of Asp194 showed that the residue may not be directly involved in proton abstraction from l-DAP. sDAPAL does not form a disulfide bond in solution, although the position of Cys299 and Cys271 in the modeled structure of sDAPAL favored the formation of a disulfide bond. Further, unlike eDAPAL, sDAPAL could be activated by monovalent cations. Mutation of the cysteine residues showed that Cys271 may be involved in coordinating the monovalent cation, as observed in the case of other fold-typeII enzymes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As populations of the world's largest animal species decline, it is unclear how ecosystems will react to their local extirpation. Due to the unique ecological characteristics of megaherbivores such as elephants, seed dispersal is one ecosystem process that may be affected as populations of large animals are decimated. In typically disturbed South Asian ecosystems, domestic bovids (cattle, Bos primigenius, and buffalo, Bubalus bubalis) may often be the species most available to replace Asian elephants (Elephas maximus) as endozoochorous dispersers of large-fruited mammal-dispersed species. We use feeding trials, germination trials, and movement data from the tropical moist forests of Buxa Tiger Reserve (India) to examine whether domestic bovids are viable replacements for elephants in the dispersal of three largefruited species: Dillenia indica, Artocarpus chaplasha, and Careya arborea. We find that (1) once consumed, seeds are between 2.5 (C. arborea) and 26.5 (D. indica) times more likely to pass undigested into elephant dung than domestic bovid dung; and (2) seeds from elephant dung germinated as well as or better than seeds taken from bovid dung for all plant species, with D. indica seeds from elephant dung 1.5 times more likely to germinate. Furthermore, since wild elephants have less constrained movements than even free-roaming domestic bovids, we calculate that maximum dispersal by elephants is between 9.5 and 11.2 times farther than that of domestic bovids, with about 20% of elephant-dispersed seeds being moved farther than the maximum distance seeds are moved by bovids. Our findings suggest that, while bovids are able to disperse substantial numbers of seeds over moderate distances for two of the three study species, domestic bovids will be unable to routinely emulate the reliable, long-distance dispersal of seeds executed by elephants in this tropical moist forest. Thus while domestic bovids can attenuate the effects of losing elephants as dispersers, they may not be able to prevent the decline of various mammal-dispersed fruiting species in the face of overhunting, habitat fragmentation, and climate change.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A routing protocol in a mobile ad hoc network (MANET) should be secure against both the outside attackers which do not hold valid security credentials and the inside attackers which are the compromised nodes in the network. The outside attackers can be prevented with the help of an efficient key management protocol and cryptography. However, to prevent inside attackers, it should be accompanied with an intrusion detection system (IDS). In this paper, we propose a novel secure routing with an integrated localized key management (SR-LKM) protocol, which is aimed to prevent both inside and outside attackers. The localized key management mechanism is not dependent on any routing protocol. Thus, unlike many other existing schemes, the protocol does not suffer from the key management - secure routing interdependency problem. The key management mechanism is lightweight as it optimizes the use of public key cryptography with the help of a novel neighbor based handshaking and Least Common Multiple (LCM) based broadcast key distribution mechanism. The protocol is storage scalable and its efficiency is confirmed by the results obtained from simulation experiments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider information theoretic secret key (SK) agreement and secure function computation by multiple parties observing correlated data, with access to an interactive public communication channel. Our main result is an upper bound on the SK length, which is derived using a reduction of binary hypothesis testing to multiparty SK agreement. Building on this basic result, we derive new converses for multiparty SK agreement. Furthermore, we derive converse results for the oblivious transfer problem and the bit commitment problem by relating them to SK agreement. Finally, we derive a necessary condition for the feasibility of secure computation by trusted parties that seek to compute a function of their collective data, using an interactive public communication that by itself does not give away the value of the function. In many cases, we strengthen and improve upon previously known converse bounds. Our results are single-shot and use only the given joint distribution of the correlated observations. For the case when the correlated observations consist of independent and identically distributed (in time) sequences, we derive strong versions of previously known converses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Biogenesis of the iron-sulfur (Fe-S) cluster is an indispensable process in living cells. In mammalian mitochondria, the initial step of the Fe-S cluster assembly process is assisted by the NFS1-ISD11 complex, which delivers sulfur to scaffold protein ISCU during Fe-S cluster synthesis. Although ISD11 is an essential protein, its cellular role in Fe-S cluster biogenesis is still not defined. Our study maps the important ISD11 amino acid residues belonging to putative helix 1 (Phe-40), helix 3 (Leu-63, Arg-68, Gln-69, Ile-72, Tyr-76), and C-terminal segment (Leu-81, Glu-84) are critical for in vivo Fe-S cluster biogenesis. Importantly, mutation of these conserved ISD11 residues into alanine leads to its compromised interaction with NFS1, resulting in reduced stability and enhanced aggregation of NFS1 in the mitochondria. Due to altered interaction with ISD11 mutants, the levels of NFS1 and Isu1 were significantly depleted, which affects Fe-S cluster biosynthesis, leading to reduced electron transport chain complex (ETC) activity and mitochondrial respiration. In humans, a clinically relevant ISD11 mutation (R68L) has been associated in the development of a mitochondrial genetic disorder, COXPD19. Our findings highlight that the ISD11 R68A/R68L mutation display reduced affinity to form a stable subcomplex with NFS1, and thereby fails to prevent NFS1 aggregation resulting in impairment of the Fe-S cluster biogenesis. The prime affected machinery is the ETC complex, which showed compromised redox properties, causing diminished mitochondrial respiration. Furthermore, the R68L ISD11 mutant displayed accumulation of mitochondrial iron and reactive oxygen species, leading to mitochondrial dysfunction, which correlates with the phenotype observed in COXPD19 patients.