833 resultados para Terrorist attacks
Resumo:
Migraine is a neurological disorder that affects the central nervous system causing painful attacks of headache. A genetic vulnerability and exposure to environmental triggers can influence the migraine phenotype. Migraine interferes in many facets of people’s daily life including employment commitments and their ability to look after their families resulting in a reduced quality of life. Identification of the biological processes that underlie this relatively common affliction has been difficult because migraine does not have any clearly identifiable pathology or structural lesion detectable by current medical technology. Theories to explain the symptoms of migraine have focused on the physiological mechanisms involved in the various phases of headache and include the vascular and neurogenic theories. In relation to migraine pathophysiology the trigeminovascular system and cortical spreading depression have also been implicated with supporting evidence from imaging studies and animal models. The objective of current research is to better understand the pathways and mechanisms involved in causing pain and headache to be able to target interventions. The genetic component of migraine has been teased apart using linkage studies and both candidate gene and genome-wide association studies, in family and case-control cohorts. Genomic regions that increase individual risk to migraine have been identified in neurological, vascular and hormonal pathways. This review discusses knowledge of the pathophysiology and genetic basis of migraine with the latest scientific evidence from genetic studies.
Resumo:
Focal segmental glomerulosclerosis (FSGS) is the consequence of a disease process that attacks the kidney's filtering system, causing serious scarring. More than half of FSGS patients develop chronic kidney failure within 10 years, ultimately requiring dialysis or renal transplantation. There are currently several genes known to cause the hereditary forms of FSGS (ACTN4, TRPC6, CD2AP, INF2, MYO1E and NPHS2). This study involves a large, unique, multigenerational Australian pedigree in which FSGS co-segregates with progressive heart block with apparent X-linked recessive inheritance. Through a classical combined approach of linkage and haplotype analysis, we identified a 21.19 cM interval implicated on the X chromosome. We then used a whole exome sequencing approach to identify two mutated genes, NXF5 and ALG13, which are located within this linkage interval. The two mutations NXF5-R113W and ALG13-T141L segregated perfectly with the disease phenotype in the pedigree and were not found in a large healthy control cohort. Analysis using bioinformatics tools predicted the R113W mutation in the NXF5 gene to be deleterious and cellular studies support a role in the stability and localization of the protein suggesting a causative role of this mutation in these co-morbid disorders. Further studies are now required to determine the functional consequence of these novel mutations to development of FSGS and heart block in this pedigree and to determine whether these mutations have implications for more common forms of these diseases in the general population.
Resumo:
A loss of function mutation in the TRESK K2P potassium channel (KCNK18), has recently been linked with typical familial migraine with aura. We now report the functional characterisation of additional TRESK channel missense variants identified in unrelated patients. Several variants either had no apparent functional effect, or they caused a reduction in channel activity. However, the C110R variant was found to cause a complete loss of TRESK function, yet is present in both sporadic migraine and control cohorts, and no variation in KCNK18 copy number was found. Thus despite the previously identified association between loss of TRESK channel activity and migraine in a large multigenerational pedigree, this finding indicates that a single non-functional TRESK variant is not alone sufficient to cause typical migraine and highlights the genetic complexity of this disorder. Migraine is a common, disabling neurological disorder with a genetic, environmental and in some cases hormonal component. It is characterized by attacks of severe, usually unilateral and throbbing headache, can be accompanied by nausea, vomiting and photophobia and is clinically divided into two main subtypes, migraine with aura (MA) when a migraine is accompanied by transient and reversible focal neurological symptoms and migraine without aura (MO)1. The multifactorial and clinical heterogeneity of the disorder have considerably hindered the identification of common migraine susceptibility genes and most of our current understanding comes from the studies of familial hemiplegic migraine (FHM), a rare monogenic autosomal dominant form of MA2. So far, the three susceptibility genes that have been convincingly identified in FHM families all encode ion channels or transporters: CACNA1A encoding the α1 subunit of the Cav2.1 calcium channel3, SCN1A encoding the Nav1.1 sodium channel4 and ATP1A2 encoding the α2 subunit of the Na+/K+ pump5. It is believed that mutations in these genes may lead to increased efflux of glutamate and potassium in the synapse and thereby cause migraine by rendering the brain more susceptible to cortical spreading depression (CSD)6 which is thought to play a role in initiating a migraine attack7,8. However, these genes have not to date been implicated in common forms of migraine9. Nevertheless, current opinion suggests that typical migraine, like FHM, is also disorder of neuronal excitability, ion homeostasis and neurotransmitter release10,11,12. Mutations in the SLC4A4 gene encoding the sodium-bicarbonate cotransporter NBCe1, have recently been implicated in several different forms of migraine13, and a variety of genes involved in glutamate homeostasis (PGCP, MTDH14 and LRP115) and a cation channel (TRPM8)15 have also recently been implicated in migraine via genome-wide association studies. Ion channels are therefore highly likely to play an important role in the pathogenesis of typical migraine. TRESK (KCNK18), is a member of the two-pore domain (K2P) family of potassium channels involved in the control of cellular electrical excitability16. Regulation of TRESK activity by the calcium-dependent phosphatase calcineurin17, as well as its expression in dorsal root ganglia (DRG)18 and trigeminal ganglia (TG)19,20 has led to a proposed role for this channel in a variety of pain pathways. In a recent study, a frameshift mutation (F139Wfsx24) in TRESK was identified in a large multigenerational pedigree where it co-segregated perfectly with typical MA and a significant genome-wide linkage LOD score of 3.0. Furthermore, functional analysis revealed that this mutation caused a complete loss of TRESK function and that the truncated subunit was also capable of down regulating wild-type channel function. This therefore highlighted KCNK18 as potentially important candidate gene and suggested that TRESK dysfunction might play a possible role in the pathogenesis of familial migraine with visual aura20. Additional screening for KCNK18 mutations in unrelated sporadic migraine and control cohorts also identified a number of other missense variants; R10G, A34V, C110R, S231P and A233V20. The A233V variant was found only in the control cohort, whilst A34V was identified in a single Australian migraine proband for which family samples were not available, but it was not detected in controls. By contrast, the R10G, C110R, and S231P variants were found in both migraineurs and controls in both cohorts. In this study, we have investigated the functional effect of these variants to further probe the potential association of TRESK dysfunction with typical migraine.
Resumo:
Objective To evaluate relative telomere length of female migraine patients. Background Migraine is a debilitating disorder affecting 6-28% of the population. Studies on the mechanisms of migraine have demonstrated genetic causes but the pathophysiology and subcellular effects of the disease remain poorly understood. Shortened telomere length is associated with age-related or chronic diseases, and induced stresses. Migraine attacks may impart significant stress on cellular function, thus this study investigates a correlation between shortening of telomeres and migraine. Methods Relative telomere length was measured using a previously described quantitative polymerase chain reaction method. A regression analysis was performed to assess differences in mean relative telomere length between migraine patients and healthy controls. Results The leukocyte telomeres of a cohort of 142 Caucasian female migraine subjects aged 18-77 years and 143 matched 17-77-year-old healthy control Caucasian women were examined.A significantly shorter relative telomere length was observed in the migraine group compared with the control group after adjusting for age and body mass index (P = .001). In addition, age of onset was observed to associate with the loss of relative telomere length, especially at early age of onset (<17 years old). No association was observed between relative telomere length and the severity and frequency of migraine attacks and the duration of migraine. Conclusion Telomeres are shorter in migraine patients and there is more variation in telomere length in migraine patients.
Resumo:
Background Migraine is a neurological disorder characterized by recurrent attacks of severe headache, affecting around 12% of Caucasian populations. It is well known that migraine has a strong genetic component, although the number and type of genes involved is still unclear. Prior linkage studies have reported mapping of a migraine gene to chromosome Xq 24–28, a region containing a cluster of genes for GABA A receptors (GABRE, GABRA3, GABRQ), which are potential candidate genes for migraine. The GABA neurotransmitter has been implicated in migraine pathophysiology previously; however its exact role has not yet been established, although GABA receptors agonists have been the target of therapeutic developments. The aim of the present research is to investigate the role of the potential candidate genes reported on chromosome Xq 24–28 region in migraine susceptibility. In this study, we have focused on the subunit GABA A receptors type ε (GABRE) and type θ (GABRQ) genes and their involvement in migraine. Methods We have performed an association analysis in a large population of case-controls (275 unrelated Caucasian migraineurs versus 275 controls) examining a set of 3 single nucleotide polymorphisms (SNPs) in the coding region (exons 3, 5 and 9) of the GABRE gene and also the I478F coding variant of the GABRQ gene. Results Our study did not show any association between the examined SNPs in our test population (P > 0.05). Conclusion Although these particular GABA receptor genes did not show positive association, further studies are necessary to consider the role of other GABA receptor genes in migraine susceptibility.
Resumo:
Migraine is a debilitating neurological disorder characterized by recurrent attacks of severe headache. The disorder is highly prevalent, affecting approximately 12% of Caucasian populations. It is well known that migraine has a strong genetic component, although the type and number of genes involved is not yet clear. However, the calcium channel gene, CACNA1A, on chromosome 19 contains mutations responsible for familial hemiplegic migraine, a rare and severe subtype of migraine. There is also evidence to suggest that serotonin- and dopamine-related genes may be involved in the pathogenesis of migraine. This study employed a linkage and association approach to investigate neurotransmitter-related migraine candidate genes. Polymorphisms within the dopamine beta-hydroxylase (DBH) gene, serotonin transporter gene (SERT), and dopamine receptor gene (DRD2) were tested in 177 unrelated Caucasian migraineurs and 182 control individuals. In addition, an independent sample of 82 families affected with migraine was examined. Unrelated case-control association analysis of a DBH intragenic dinucleotide polymorphism indicated altered allelic distribution between migraine and control groups (L2=16.53, P=0.019). Furthermore, the transmission/disequilibrium test, which was implemented on the family data, also indicated distortion of allele transmission for the same DBH marker (L2=4.44, P=0.035). Together, these results provide evidence for allelic association of the DBH gene with typical migraine susceptibility (Fisher's combined P value=0.006) and indicate that further research into the role of the DBH gene in the etiology of migraine is warranted.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
Background Asthma is a serious global health problem. However, few studies have investigated the relationship between cold spells and pediatric outpatient visits for asthma. Objective To examine the association between cold spells and pediatric outpatient visits for asthma in Shanghai, China. Methods We collected daily data on pediatric outpatient visits for asthma, mean temperature, relative humidity, and ozone from Shanghai between 1 January 2007 and 31 December 2009. We defined cold spells as four or more consecutive days with temperature below the 5th percentile of temperature during 2007–2009. We used a Poisson regression model to examine the impact of temperature on pediatric outpatient visits for asthma in cold seasons during 2007 and 2009. We examined the effect of cold spells on asthma compared with non-cold spell days. Results There was a significant relationship between cold temperatures and pediatric outpatient visits for asthma. The cold effects on children's asthma were observed at different lags. The lower the temperatures, the higher the risk for asthma attacks among children. Conclusion Cold temperatures, particularly cold spells, significantly increase the risk of pediatric outpatient visits for asthma. The findings suggest that asthma children need to be better protected from cold effects in winter.
Resumo:
A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.
Resumo:
This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.
Resumo:
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.
Resumo:
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( IND-CCA ), and can be used to construct privacy-preserving protocols such as deniable authentication. Unlike many other security notions, plaintext awareness is very fragile when it comes to differences between the random oracle and standard models; for example, many implications involving PA in the random oracle model are not valid in the standard model and vice versa. Similarly, strategies for proving PA of schemes in one model cannot be adapted to the other model. Existing research addresses PA in detail only in the public key setting. This paper gives the first formal exploration of plaintext awareness in the identity-based setting and, as initial work, proceeds in the random oracle model. The focus is laid mainly on identity-based key encapsulation mechanisms (IB-KEMs), for which the paper presents the first definitions of plaintext awareness, highlights the role of PA in proof strategies of IND-CCA security, and explores relationships between PA and other security properties. On the practical side, our work offers the first, highly efficient, general approach for building IB-KEMs that are simultaneously plaintext-aware and IND-CCA -secure. Our construction is inspired by the Fujisaki-Okamoto (FO) transform, but demands weaker and more natural properties of its building blocks. This result comes from a new look at the notion of γ -uniformity that was inherent in the original FO transform. We show that for IB-KEMs (and PK-KEMs), this assumption can be replaced with a weaker computational notion, which is in fact implied by one-wayness. Finally, we give the first concrete IB-KEM scheme that is PA and IND-CCA -secure by applying our construction to a popular IB-KEM and optimizing it for better performance.
Resumo:
Focused on the alternative futures of terrorism, this study engages with the different levels of terrorism knowledge to identify and challenge the restrictive narratives that define terrorism: that "society must be defended" from the "constant and evolving terrorist threat". Using Causal Layered Analysis to deconstruct and reconstruct strategies, alternative scenarios emerge. These alternative futures are depicted collectively as a maze, highlighting the prospect of navigating towards preferred and even shared terrorism futures, once these are supported by new and inclusive metaphors and stakeholder engagement.