Learn More
File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers can inject "faked" packets into the file distribution process to slow down the information dispersal or even deplete the network resource. Therefore, content verification is an(More)
Cellular iron homeostasis is maintained by the coordinate posttranscriptional regulation of genes responsible for iron uptake, release, use, and storage through the actions of the iron regulatory proteins IRP1 and IRP2. However, the manner in which iron levels are sensed to affect IRP2 activity is poorly understood. We found that an E3 ubiquitin ligase(More)
There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a sketch. It is desirable that the sketch reveals little information about the biometric templates even in the worst case (i.e., the entropy loss should be low). The main difficulty is(More)
Site-specific proteolysis of the amyloid-beta precursor protein (APP) by BACE 1 and gamma-secretase, a central event in Alzheimer disease, releases a large secreted extracellular fragment (called APP(S)), peptides of 40-43 residues derived from extracellular and transmembrane sequences (Abeta), and a short intracellular fragment (APP intracellular domain)(More)
In order to apply cryptographic operations on noisy data, a recent approach employs some additional public data, known as <i>secure sketch</i>, to correct the noise so that consistent outcome can be obtained. This approach can be employed to extract authentication tags from noisy multimedia or biometric objects, by including the sketch in the tags. However,(More)
Neuregulins bind to and activate members of the EGF receptor family of tyrosine kinases that initiate a signaling cascade that induces acetylcholine receptor synthesis in the postsynaptic membrane of neuromuscular synapses. In addition to an EGF-like domain, sufficient for receptor binding and tyrosine auto-phosphorylation, many spliced forms also have an(More)
Secure storage of biometric templates has become an increasingly important issue in biometric authentication systems. We study how secure sketch, a recently proposed error-tolerant cryptographic primitive, can be applied to protect the templates. We identify several practical issues that are not addressed in the existing theoretical framework, and show the(More)
Since biometric data cannot be easily replaced or revoked, it is important that biometric templates used in biometric applications should be constructed and stored in a secure way, such that attackers would not be able to forge biometric data easily even when the templates are compromised. This is a challenging goal since biometric data are "noisy" by(More)
A major challenge in digital forensics is the efficient and accurate file type classification of a fragment of evidence data, in the absence of header and file system information. A typical approach to this problem is to classify the fragment based on simple statistics, such as the entropy and the statistical distance of byte histograms. This approach is(More)
Inflammatory cytokine interleukin-1 (IL-1) performs multiple functions in the central nervous system. The type 1 IL-1 receptor (IL-1R1) and the IL-1 receptor accessory protein (IL-1RAcP) form a functional IL-1 receptor complex that is thought to mediate most, if not all, IL-1-induced effects. Several recent studies, however, suggest the existence of a(More)