Learn More
Keywords: Secure computation auditing Secure storage Privacy-cheating discouragement Designated verifier signature Batch verification Cloud computing a b s t r a c t Cloud computing emerges as a new computing paradigm that aims to provide reliable, cus-tomized and quality of service guaranteed computation environments for cloud users. Applications and(More)
Excessive extracellular deposition of amyloid- peptide (Aβ) in the brain is the pathological hallmark of Alzheimer's disease (AD). Cumulative evidence indicates that autophagy is involved in the metabolism of Aβ and pathogenesis of AD. However, the molecular mechanism underlying the pathogenesis of AD is not yet well defined, and there has been no effective(More)
Cell therapy is a potential therapeutic approach for neurodegenerative disorders, such as Alzheimer disease (AD). Neuronal differentiation of stem cells before transplantation is a promising procedure for cell therapy. However, the therapeutic impact and mechanisms of action of neuron-like cells differentiated from human umbilical cord mesenchymal stem(More)
The peptide amphiphile (PA) with a laminin epitope IKVAV (IKVAV-PA) can be trigged into three-dimensional nanostructures in vivo. Application of IKVAV-PA to the injured spinal cord resulted in significant functional improvement in rodents with remarkable axonal regeneration at the lesion site. Here we showed that injection of IKVAV-PA into the hippocampus(More)
Alzheimer's disease (AD) is one of most prevalent dementias, which is characterized by the deposition of extracellular amyloid-beta protein (Aβ) and the formation of neurofibrillary tangles within neurons. Although stereotaxic transplantation of mesenchymal stem cells (MSCs) into the hippocampus of AD animal model as immunomodulatory cells has been(More)
Delay/Disruption tolerant networks (DTNs) are self-organized wireless ad-hoc networks, where end-to-end connectivity can not be guaranteed and communications rely on the assumption that the nodes are willing to store-carry-and-forward bundles in an opportunistic way. However, this assumption would be easily violated due to the selfish nodes which are(More)