992 resultados para Seven against Thebes
Immunity against a Chlamydia infection and disease may be determined by a balance of IL-17 signaling
Resumo:
Most vaccines developed against Chlamydia using animal models provide partial protection against a genital tract infection. However, protection against the oviduct pathology associated with infertility is highly variable and often has no defining immunological correlate. When comparing two adjuvants (CTA1-DD and a combination of Cholera toxin plus CpG- oligodeoxynucleotide–CT/CpG) combined with the chlamydial major outer membrane protein (MOMP) antigen and delivered via the intranasal (IN), sublingual (SL) or transcutaneous (TC) routes, we identified two vaccine groups with contrasting outcomes following infection. SL immunization with MOMP/CTA1-DD induced a 70% reduction in the incidence of oviduct pathology, without significantly altering the course of infection. Conversely, IN immunization with MOMP/CT/CpG prevented an ascending infection, but not the oviduct pathology. This anomaly presented a unique opportunity to study the mechanisms by which vaccines can prevent oviduct pathology, other than by controlling the infection. The IL-17 signaling in the oviducts was found to associate with both the enhancement of immunity to infection and the development of oviduct pathology. This conflicting role of IL-17 may provide some explanation for the discordance in protection between infection and disease and suggests that controlling immunopathology, as opposed to the rapid eradication of the infection, may be essential for an effective human chlamydial vaccine that prevents infertility.
Resumo:
Chlamydia pneumoniae is responsible for up to 20% of community acquired pneumonia and can exacerbate chronic inflammatory diseases. As the majority of infections are either mild or asymptomatic, a vaccine is recognized to have the greatest potential to reduce infection and disease prevalence. Using the C. muridarum mouse model of infection, we immunized animals via the intranasal (IN), sublingual (SL) or transcutaneous (TC) routes, with recombinant chlamydial major outer membrane protein (MOMP) combined with adjuvants CTA1-DD or a combination of cholera toxin/CpG-oligodeoxynucleotide (CT/CpG). Vaccinated animals were challenged IN with C. muridarum and protection against infection and pathology was assessed. SL and TC immunization with MOMP and CT/CpG was the most protective, significantly reducing chlamydial burden in the lungs and preventing weight loss, which was similar to the protection induced by a previous live infection. Unlike a previous infection however, these vaccinations also provided almost complete protection against fibrotic scarring in the lungs. Protection against infection was associated with antigen-specific production of IFNγ, TNFα and IL-17 by splenocytes, however, protection against both infection and pathology required the induction of a similar pro-inflammatory response in the respiratory tract draining lymph nodes. Interestingly, we also identified two contrasting vaccinations capable of preventing infection or pathology individually. Animals IN immunized with MOMP and either adjuvant were protected from infection, but not the pathology. Conversely, animals TC immunized with MOMP and CTA1-DD were protected from pathology, even though the chlamydial burden in this group was equivalent to the unimmunized controls. This suggests that the development of pathology following an IN infection of vaccinated animals was independent of bacterial load and may have been driven instead by the adaptive immune response generated following immunization. This identifies a disconnection between the control of infection and the development of pathology, which may influence the design of future vaccines.
Resumo:
We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.
Resumo:
Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermined number of messages. They are interesting cryptographic primitives because they allow to solve many important cryptographic problems, and at the same time offer substantial efficiency advantage over ordinary digital signature schemes like RSA. Multiple-time signature schemes have found numerous applications, in ordinary, on-line/off-line, forward-secure signatures, and multicast/stream authentication. We propose a multiple-time signature scheme with very efficient signing and verifying. Our construction is based on a combination of one-way functions and cover-free families, and it is secure against the adaptive chosen-message attack.
Resumo:
We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that for any related-key differential characteristic on full-round PRESENT-80, the probability of the characteristic only in the 64-bit state is not higher than 2−64. To overcome the exponential (in the state and key sizes) computational complexity of the search we use truncated differences, however as the key schedule is not nibble oriented, we switch to actual differences and apply early abort techniques to prune the tree-based search. With a new method called extended split approach we are able to make the whole search feasible and we implement and run it in real time. Our approach targets the PRESENT-80 cipher however,with small modifications can be reused for other lightweight ciphers as well.
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
Resumo:
Streaming services like Spotify and Pandora pay many millions of dollars each year for the rights to the music they play. But how much of this ends up back with artists and songwriters? The answer: not an awful lot.
Resumo:
There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.
Resumo:
It is well established that calcitonin is a potent inhibitor of bone resorption; however, a physiological role for calcitonin acting through its cognate receptor, the calcitonin receptor (CTR), has not been identified. Data from previous genetically modified animal models have recognized a possible role for calcitonin and the CTR in controlling bone formation; however, interpretation of these data are complicated, in part because of their mixed genetic background. Therefore, to elucidate the physiological role of the CTR in calcium and bone metabolism, we generated a viable global CTR knockout (KO) mouse model using the Cre/loxP system, in which the CTR is globally deleted by >94% but <100%. Global CTRKOs displayed normal serum ultrafiltrable calcium levels and a mild increase in bone formation in males, showing that the CTR plays a modest physiological role in the regulation of bone and calcium homeostasis in the basal state in mice. Furthermore, the peak in serum total calcium after calcitriol [1,25(OH)2D3]-induced hypercalcemia was substantially greater in global CTRKOs compared with controls. These data provide strong evidence for a biological role of the CTR in regulating calcium homeostasis in states of calcium stress.
Resumo:
High-throughput screening of cytochrome P450CAM libraries, for their ability to oxidise indole to indigo and indirubin, has resulted in the identification of variants with activity towards the structurally unrelated substrate diphenylmethane.
Resumo:
Opposition to men’s violence against women who are their intimate partners has become politically popular in the United States. The Violence Against Women Act (VAWA) has enjoyed broad-based support for over 15 years. VAWA has been refined and expanded with each reauthorization. Resistance to the battered women’s movement is often overlooked in this political context. However, woman abuse and state responses to it are mired in cultural tensions about crime, law, gender, economics, scholarship, and the family. Based on interviews with 35 advocates in the United States, this paper outlines key tactics of antifeminist backlash against the battered women’s movement.
Resumo:
Self-regulation refers to our individual capacities to regulate our behaviours, emotions, and thoughts, with these skills developing rapidly across early childhood. This thesis examined sleep, emotional, and cognitive regulation development, and related parental influences, for children participating in the Longitudinal Study of Australian Children. Important longitudinal associations among children's self-regulation, maternal mental health, parenting, and later behaviour problems for children were also investigated. A unique contribution of this research was a prevalence estimate of early childhood self-regulation problems in Australian children that was documented for the first time.
Resumo:
In Kumar v Suncorp Metway Insurance Limited [2004] QSC 381 Douglas J examined s37 of the Motor Accident Insurance Act 1994 (Qld) in the context of an accident involving multiple insurers when a notice of accident had not been given to the Nominal Defendant
Resumo:
In Devlin v South Mole Island Resort [2003] QSC 020 the Court concluded the applicant was entitled to pursue a concurrent claim he alleged he had against the respondent under the Personal Injuries Proceedings Act 2002 in respect of injuries sustained in the course of employment, and also that the Workcover Queensland Act 1996 did not abolish the applicant's right to proceed against the respondent.
Resumo:
Community-based protests against major construction and engineering projects are becoming increasingly common as concerns over issues such as corporate social accountability, climate change and corruption become more prominent in the public's mind. Public perceptions of risk associated with these projects can have a contagious effect, which mismanaged can escalate into long-term and sometimes acrimonious protest stand-offs that have negative implications for the community, firms involved and the construction industry as a whole. This paper investigates the role of core group members in sustaining community-based protest against construction and engineering projects. Using a thematic story telling approach which draws on ethnographic method and social contagion theories, it presents an in-depth analysis of a single case study - one of Australia's longest standing community protests against a construction project. It concludes that core group members play a critical role, within anarchic structures which provide a high degree of spontaneity and improvisation, in sustaining movement continuity by building collective identity, mobilising resources and a moving interface which developers find hard to communicate with.