• Publications
  • Influence
Nanoparticulated quercetin in combating age related cerebral oxidative injury.
Reactive oxygen species e.g. O(2)(*-), H(2)O(2) and *OH generated by the induction of oxidative stress exert a potential threat on the activity of endogenous antioxidant enzymes and substantiallyExpand
  • 52
  • 3
Vesicular flavonoid in combating diethylnitrosamine induced hepatocarcinoma in rat model.
Reactive oxygen species (O2(*-), OH(-), H2O2) are known to play an important role in tumor initiation in hepatocarcinoma. Hepatocarcinoma was developed in the Swiss Albino rats by administrationExpand
  • 33
  • 3
Comparison of global transcription responses allows identification of Vibrio cholerae genes differentially expressed following infection.
Comparison of global transcription profiles of Vibrio cholerae grown in vitro and in vivo revealed that 20% of the genome was repressed and about 5% was induced under in vivo conditions.Expand
  • 39
  • 2
Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key
Why do individuals choose to use (or not use) Two Factor Authentication (2FA)? We sought to answer this by implementing a two-phase study of the Yubico Security Key. We analyzed acceptability andExpand
  • 33
  • 2
  • PDF
Decrease in beta-adrenergic receptors of cerebral astrocytes in hypothyroid rat brain.
Studies on the binding of 3H-dihydroalprenolol (3H-DHA) to astrocytes from cerebra of normal and hypothyroid rats show that hypothyroidism results in a decline in the beta-adrenergic receptors.Expand
  • 18
  • 2
A qualitative study on usability and acceptability of Yubico security key
Individual concerns about account takeover and subversion are well-documented. Surveys indicate that concerns for the privacy and security of online accounts are widely shared. Adopting Two-FactorExpand
  • 9
  • 2
Conversions of the left-handed form and the protonated form of DNA back to the bound right-handed form by sanguinarine and ethidium: a comparative study.
The interaction of sanguinarine and ethidium with right-handed (B-form), left-handed (Z-form) and left-handed protonated (designated as H(L)-form) structures of poly(dG-dC).poly(dG-dC) andExpand
  • 47
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content
Traditional single-factor authentication possesses several critical security vulnerabilities due to single-point failure feature. Multi-factor authentication (MFA), intends to enhance security byExpand
  • 7
  • PDF
Anaesthesia and the Internet.
  • 7
All About Phishing: Exploring User Research through a Systematic Literature Review
Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses legitimate risks to businesses, government agencies, and all users due to sensitive data breaches,Expand
  • 7
  • PDF