990 resultados para 187-1164
Resumo:
Along with the growing demand for cryptosystems in systems ranging from large servers to mobile devices, suitable cryptogrophic protocols for use under certain constraints are becoming more and more important. Constraints such as calculation time, area, efficiency and security, must be considered by the designer. Elliptic curves, since their introduction to public key cryptography in 1985 have challenged established public key and signature generation schemes such as RSA, offering more security per bit. Amongst Elliptic curve based systems, pairing based cryptographies are thoroughly researched and can be used in many public key protocols such as identity based schemes. For hardware implementions of pairing based protocols, all components which calculate operations over Elliptic curves can be considered. Designers of the pairing algorithms must choose calculation blocks and arrange the basic operations carefully so that the implementation can meet the constraints of time and hardware resource area. This thesis deals with different hardware architectures to accelerate the pairing based cryptosystems in the field of characteristic two. Using different top-level architectures the hardware efficiency of operations that run at different times is first considered in this thesis. Security is another important aspect of pairing based cryptography to be considered in practically Side Channel Analysis (SCA) attacks. The naively implemented hardware accelerators for pairing based cryptographies can be vulnerable when taking the physical analysis attacks into consideration. This thesis considered the weaknesses in pairing based public key cryptography and addresses the particular calculations in the systems that are insecure. In this case, countermeasures should be applied to protect the weak link of the implementation to improve and perfect the pairing based algorithms. Some important rules that the designers must obey to improve the security of the cryptosystems are proposed. According to these rules, three countermeasures that protect the pairing based cryptosystems against SCA attacks are applied. The implementations of the countermeasures are presented and their performances are investigated.
Resumo:
This Portfolio of Exploration outlines the course of learning by a practitioner on a personal leadership journey. It constructs a functional examination of ideas around leadership. It explores the belief system which underpins leadership practice and it also explores to what extent the increased participation of women can lead to a qualitatively different type of leadership. Different models of leadership are explored to find the model which can best fit with the author’s perception of leadership. The Women’s Intercultural Leadership Model is discussed. This model conceptualises leadership as the envisioning of oneself and others as potential leaders. It seeks to promote that recognition whilst at the same time encouraging personal transformation. The promotion of a values based leadership is examined. The value of fairness is examined as an element of functional leadership. The extent to which increasing the number of women in leadership can lead to a qualitatively different type of leadership is explored. Drucker’s assertion that every practice rests on theory is used to unearth the underlying assumptions of this reflective practitioner doctorate. Kegan’s Theory of Adult Mental Development and Subject-Object separation is used to explicitly examine knowledge construction. Myers Briggs Type Indicator (MBTI) and Assumption/Commitment/Behaviour/Outcome (ACBO) template are used to promote practice change.
Resumo:
Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.
Resumo:
G protein-coupled receptor kinase 2 (GRK2) phosphorylates activated G protein-coupled receptors (GPCRs), which ultimately leads to their desensitization and/or downregulation. The enzyme is recruited to the plasma membrane via the interaction of its carboxyl-terminal pleckstrin-homology (PH) domain with the beta and gamma subunits of heterotrimeric G proteins (Gbetagamma). An improved purification scheme for GRK2 has been developed, conditions under which GRK2 forms a complex with Gbeta(1)gamma(2) have been determined and the complex has been crystallized in CHAPS detergent micelles. Crystals of the GRK2-Gbetagamma complex belong to space group C2 and have unit-cell parameters a = 187.0, b = 72.1, c = 122.0 A, beta = 115.2 degrees. A complete data set has been collected to 3.2 A resolution with Cu Kalpha radiation.
Resumo:
RATIONALE: Asthma is prospectively associated with age-related chronic diseases and mortality, suggesting the hypothesis that asthma may relate to a general, multisystem phenotype of accelerated aging. OBJECTIVES: To test whether chronic asthma is associated with a proposed biomarker of accelerated aging, leukocyte telomere length. METHODS: Asthma was ascertained prospectively in the Dunedin Multidisciplinary Health and Development Study cohort (n = 1,037) at nine in-person assessments spanning ages 9-38 years. Leukocyte telomere length was measured at ages 26 and 38 years. Asthma was classified as life-course-persistent, childhood-onset not meeting criteria for persistence, and adolescent/adult-onset. We tested associations between asthma and leukocyte telomere length using regression models. We tested for confounding of asthma-leukocyte telomere length associations using covariate adjustment. We tested serum C-reactive protein and white blood cell counts as potential mediators of asthma-leukocyte telomere length associations. MEASUREMENTS AND MAIN RESULTS: Study members with life-course-persistent asthma had shorter leukocyte telomere length as compared with sex- and age-matched peers with no reported asthma. In contrast, leukocyte telomere length in study members with childhood-onset and adolescent/adult-onset asthma was not different from leukocyte telomere length in peers with no reported asthma. Adjustment for life histories of obesity and smoking did not change results. Study members with life-course-persistent asthma had elevated blood eosinophil counts. Blood eosinophil count mediated 29% of the life-course-persistent asthma-leukocyte telomere length association. CONCLUSIONS: Life-course-persistent asthma is related to a proposed biomarker of accelerated aging, possibly via systemic eosinophilic inflammation. Life histories of asthma can inform studies of aging.
Resumo:
Small bistratified cells (SBCs) in the primate retina carry a major blue-yellow opponent signal to the brain. We found that SBCs also carry signals from rod photoreceptors, with the same sign as S cone input. SBCs exhibited robust responses under low scotopic conditions. Physiological and anatomical experiments indicated that this rod input arose from the AII amacrine cell-mediated rod pathway. Rod and cone signals were both present in SBCs at mesopic light levels. These findings have three implications. First, more retinal circuits may multiplex rod and cone signals than were previously thought to, efficiently exploiting the limited number of optic nerve fibers. Second, signals from AII amacrine cells may diverge to most or all of the approximately 20 retinal ganglion cell types in the peripheral primate retina. Third, rod input to SBCs may be the substrate for behavioral biases toward perception of blue at mesopic light levels.
Resumo:
Grafts can be rejected even when matched for MHC because of differences in the minor histocompatibility Ags (mH-Ags). H4- and H60-derived epitopes are known as immunodominant mH-Ags in H2(b)-compatible BALB.B to C57BL/6 transplantation settings. Although multiple explanations have been provided to explain immunodominance of Ags, the role of vascularization of the graft is yet to be determined. In this study, we used heart (vascularized) and skin (nonvascularized) transplantations to determine the role of primary vascularization of the graft. A higher IFN-γ response toward H60 peptide occurs in heart recipients. In contrast, a higher IFN-γ response was generated against H4 peptide in skin transplant recipients. Peptide-loaded tetramer staining revealed a distinct antigenic hierarchy between heart and skin transplantation: H60-specific CD8(+) T cells were the most abundant after heart transplantation, whereas H4-specific CD8(+) T cells were more abundant after skin graft. Neither the tissue-specific distribution of mH-Ags nor the draining lymph node-derived dendritic cells correlated with the observed immunodominance. Interestingly, non-primarily vascularized cardiac allografts mimicked skin grafts in the observed immunodominance, and H60 immunodominance was observed in primarily vascularized skin grafts. However, T cell depletion from the BALB.B donor prior to cardiac allograft induces H4 immunodominance in vascularized cardiac allograft. Collectively, our data suggest that immediate transmigration of donor T cells via primary vascularization is responsible for the immunodominance of H60 mH-Ag in organ and tissue transplantation.
Resumo:
T cell activation leads to engagement of cellular metabolic pathways necessary to support cell proliferation and function. However, our understanding of the signal transduction pathways that regulate metabolism and their impact on T cell function remains limited. The liver kinase B1 (LKB1) is a serine/threonine kinase that links cellular metabolism with cell growth and proliferation. In this study, we demonstrate that LKB1 is a critical regulator of T cell development, viability, activation, and metabolism. T cell-specific ablation of the gene that encodes LKB1 resulted in blocked thymocyte development and a reduction in peripheral T cells. LKB1-deficient T cells exhibited defects in cell proliferation and viability and altered glycolytic and lipid metabolism. Interestingly, loss of LKB1 promoted increased T cell activation and inflammatory cytokine production by both CD4(+) and CD8(+) T cells. Activation of the AMP-activated protein kinase (AMPK) was decreased in LKB1-deficient T cells. AMPK was found to mediate a subset of LKB1 functions in T lymphocytes, as mice lacking the α1 subunit of AMPK displayed similar defects in T cell activation, metabolism, and inflammatory cytokine production, but normal T cell development and peripheral T cell homeostasis. LKB1- and AMPKα1-deficient T cells each displayed elevated mammalian target of rapamycin complex 1 signaling and IFN-γ production that could be reversed by rapamycin treatment. Our data highlight a central role for LKB1 in T cell activation, viability, and metabolism and suggest that LKB1-AMPK signaling negatively regulates T cell effector function through regulation of mammalian target of rapamycin activity.
Resumo:
*Hydraulic redistribution (HR) of water via roots from moist to drier portions of the soil occurs in many ecosystems, potentially influencing both water use and carbon assimilation. *By measuring soil water content, sap flow and eddy covariance, we investigated the temporal variability of HR in a loblolly pine (Pinus taeda) plantation during months of normal and below-normal precipitation, and examined its effects on tree transpiration, ecosystem water use and carbon exchange. *The occurrence of HR was explained by courses of reverse flow through roots. As the drought progressed, HR maintained soil moisture above 0.15 cm(3) cm(-3) and increased transpiration by 30-50%. HR accounted for 15-25% of measured total site water depletion seasonally, peaking at 1.05 mm d(-1). The understory species depended on water redistributed by the deep-rooted overstory pine trees for their early summer water supply. Modeling carbon flux showed that in the absence of HR, gross ecosystem productivity and net ecosystem exchange could be reduced by 750 and 400 g C m(-2) yr(-1), respectively. *Hydraulic redistribution mitigated the effects of soil drying on understory and stand evapotranspiration and had important implications for net primary productivity by maintaining this whole ecosystem as a carbon sink.
Resumo:
RATIONALE: Tuberculosis (TB) remains a leading cause of death, and the role of T-cell responses to control Mycobacterium tuberculosis infections is well recognized. Patients with latent TB infection develop strong IFN-gamma responses to the protective antigen heparin-binding hemagglutinin (HBHA), whereas patients with active TB do not. OBJECTIVES: We investigated the mechanism of this difference and evaluated the possible involvement of regulatory T (Treg) cells and/or cytokines in the low HBHA T-cell responses of patients with active TB. METHODS: The impact of anti-transforming growth factor (TGF)-beta and anti-IL-10 antibodies and of Treg cell depletion on the HBHA-induced IFN-gamma secretion was analyzed, and the Treg cell phenotype was characterized by flow cytometry. MEASUREMENTS AND MAIN RESULTS: Although the addition of anti-TGF-beta or anti-IL-10 antibodies had no effect on the HBHA-induced IFN-gamma secretion in patients with active TB, depletion of CD4(+)CD25(high)FOXP3(+) T lymphocytes resulted in the induction by HBHA of IFN-gamma concentrations that reached levels similar to those obtained for latent TB infection. No effect was noted on the early-secreted antigen target-6 or candidin T-cell responses. CONCLUSIONS: Specific CD4(+)CD25(high)FOXP3(+) T cells depress the T-cell-mediated immune responses to the protective mycobacterial antigen HBHA during active TB in humans.
Resumo:
RATIONALE: Tuberculosis (TB) remains a major cause of mortality. A better understanding of the immune responses to mycobacterial antigens may be helpful to develop improved vaccines and diagnostics. OBJECTIVE: The mycobacterial antigen heparin-binding-hemagglutinin (HBHA) induces strong interferon-gamma (IFN-gamma) responses by circulating lymphocytes from Mycobacterium tuberculosis latently infected subjects, and low responses associated with CD4(+) regulatory T (Treg) cells in TB patients. Here, we investigated HBHA-specific IFN-gamma responses at the site of the TB disease. METHODS: Bronchoalveolar lavages, pleural fluids and blood were prospectively collected from 61 patients with a possible diagnosis of pulmonary and/or pleural TB. HBHA-specific IFN-gamma production was analyzed by flow cytometry and ELISA. The suppressive effect of pleural Treg cells was investigated by depletion experiments. MEASUREMENTS AND MAIN RESULTS: The percentages of HBHA-induced IFN-gamma(+) alveolar and pleural lymphocytes were higher for pulmonary (P<0.0001) and for pleural (P<0.01) TB than for non-TB controls. Local CD4(+) and CD8(+) T cells produced the HBHA-specific IFN-gamma. This local secretion was not suppressed by Treg lymphocytes, contrasting with previously reported data on circulating lymphocytes. CONCLUSION: TB patients display differential effector and regulatory T cell responses to HBHA in local and circulating lymphocytes with a predominant effector CD4(+) and CD8(+) response locally, compared to a predominant Treg response among circulating lymphocytes. These findings may be helpful for the design of new vaccines against TB, and the detection of HBHA-specific T cells at the site of the infection may be a promising tool for the rapid diagnosis of active TB.
Resumo:
p.187-196
Resumo:
p.187-200
Resumo:
p.187-194