Learn More
The bioavailability of nitric oxide (NO) within the vascular wall is limited by superoxide anions (O2.-). The relevance of extracellular superoxide dismutase (ecSOD) for the detoxification of vascular O2.- is unknown. We determined the involvement of ecSOD in the control of blood pressure and endothelium-dependent responses in angiotensin II-induced(More)
Network operators gradually open their interfaces to formerly hidden services. This fosters the development of a new class of mobile applications that take into account user's location and presence information. However, this development also raises problems especially the lack of protection of privacy in location-based services. This paper proposes a(More)
The soluble epoxide hydrolase (sEH) metabolizes vasodilatory epoxyeicosatrienoic acids (EETs) to their di-hydroxy derivatives. We hypothesized that the metabolism of EETs by the sEH contributes to angiotensin II-induced hypertension and tested the effects of a water-soluble sEH inhibitor, 12-(3-adamantan-1-yl-ureido) dodecanoic acid (AUDA) on blood(More)
Epoxyeicotrienoic acids (EETs) are cytochrome P450-dependent anti-hypertensive and anti-inflammatory derivatives of arachidonic acid, which are highly abundant in the kidney and considered reno-protective. EETs are degraded by the enzyme soluble epoxide hydrolase (sEH) and sEH inhibitors are considered treatment for chronic renal failure (CRF). We(More)
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of networks and mobile devices but also because of novel location-based mobile applications which raise many expectations in the mobile market. As a result network operators start to offer(More)
In this paper we present and discuss a new approach for securing mul-timedia communication, which is based on three innovations. The first innovation is the integration of a challenge-response scheme for enhancing the Diffie-Hellman based ZRTP protocol. When being called, a callee must present the result of a computational puzzle (a " token ") within a(More)
ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a VoIP connection. It uses Diffie-Hellman (DH) key exchange to agree upon a session key, which is inherently vulnerable to active Man-in-the-Middle (MitM) attacks. Therefore ZRTP introduces(More)
Network Operators start to offer formerly hidden services such as location service, messaging services and presence services. This fosters the development of a new class of innovative context aware applications that are operated by third party application providers. However, without the implementation of proper privacy protection mechanisms, location and(More)