Learn More
Keywords: Secure computation auditing Secure storage Privacy-cheating discouragement Designated verifier signature Batch verification Cloud computing a b s t r a c t Cloud computing emerges as a new computing paradigm that aims to provide reliable, cus-tomized and quality of service guaranteed computation environments for cloud users. Applications and(More)
Cloud computing becomes a hot research topic in the recent years. In the cloud computing, software applications and databases are moved to the centralized large data centers, which is called cloud. In the cloud, due to lack of physical possession of the data and the machine, the data and computation may not be well managed and fully trusted by cloud users.(More)
To enhance the security of mobile cloud users, a few proposals have been presented recently. However we argue that most of them are not suitable for mobile cloud where mobile users might join or leave the mobile networks arbitrarily. In this paper, we design a secure mobile user-based data service mechanism (SDSM) to provide confidentiality and fine-grained(More)
Excessive extracellular deposition of amyloid- peptide (Aβ) in the brain is the pathological hallmark of Alzheimer's disease (AD). Cumulative evidence indicates that autophagy is involved in the metabolism of Aβ and pathogenesis of AD. However, the molecular mechanism underlying the pathogenesis of AD is not yet well defined, and there has been no effective(More)
Alzheimer's disease (AD) is one of most prevalent dementias, which is characterized by the deposition of extracellular amyloid-beta protein (Aβ) and the formation of neurofibrillary tangles within neurons. Although stereotaxic transplantation of mesenchymal stem cells (MSCs) into the hippocampus of AD animal model as immunomodulatory cells has been(More)
The peptide amphiphile (PA) with a laminin epitope IKVAV (IKVAV-PA) can be trigged into three-dimensional nanostructures in vivo. Application of IKVAV-PA to the injured spinal cord resulted in significant functional improvement in rodents with remarkable axonal regeneration at the lesion site. Here we showed that injection of IKVAV-PA into the hippocampus(More)
This peer-reviewed article can be downloaded, printed and distributed freely for any purposes (see copyright notice below). which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract Introduction
Cell therapy is a potential therapeutic approach for neurodegenerative disorders, such as Alzheimer disease (AD). Neuronal differentiation of stem cells before transplantation is a promising procedure for cell therapy. However, the therapeutic impact and mechanisms of action of neuron-like cells differentiated from human umbilical cord mesenchymal stem(More)
Delay/Disruption tolerant networks (DTNs) are self-organized wireless ad-hoc networks, where end-to-end connectivity can not be guaranteed and communications rely on the assumption that the nodes are willing to store-carry-and-forward bundles in an opportunistic way. However, this assumption would be easily violated due to the selfish nodes which are(More)