Author pages are created from data sourced from our academic publisher partnerships and public sources.
Nanoparticulated quercetin in combating age related cerebral oxidative injury.
- S. Das, A. Mandal, A. Ghosh, S. Panda, N. Das, S. Sarkar
- Medicine, Biology
- Current aging science
- 30 November 2008
Reactive oxygen species e.g. O(2)(*-), H(2)O(2) and *OH generated by the induction of oxidative stress exert a potential threat on the activity of endogenous antioxidant enzymes and substantially… Expand
Vesicular flavonoid in combating diethylnitrosamine induced hepatocarcinoma in rat model.
- A. Mandal, S. Das, Maitreyi Mitra, R. Chakrabarti, Malay Chatterjee, N. Das
- Medicine, Biology
- Journal of experimental therapeutics & oncology
Reactive oxygen species (O2(*-), OH(-), H2O2) are known to play an important role in tumor initiation in hepatocarcinoma. Hepatocarcinoma was developed in the Swiss Albino rats by administration… Expand
Comparison of global transcription responses allows identification of Vibrio cholerae genes differentially expressed following infection.
- S. Das, A. Chakrabortty, R. Banerjee, S. Roychoudhury, K. Chaudhuri
- Biology, Medicine
- FEMS microbiology letters
- 1 September 2000
Comparison of global transcription profiles of Vibrio cholerae grown in vitro and in vivo revealed that 20% of the genome was repressed and about 5% was induced under in vivo conditions.… Expand
Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key
Why do individuals choose to use (or not use) Two Factor Authentication (2FA)? We sought to answer this by implementing a two-phase study of the Yubico Security Key. We analyzed acceptability and… Expand
Decrease in beta-adrenergic receptors of cerebral astrocytes in hypothyroid rat brain.
Studies on the binding of 3H-dihydroalprenolol (3H-DHA) to astrocytes from cerebra of normal and hypothyroid rats show that hypothyroidism results in a decline in the beta-adrenergic receptors.… Expand
A qualitative study on usability and acceptability of Yubico security key
Individual concerns about account takeover and subversion are well-documented. Surveys indicate that concerns for the privacy and security of online accounts are widely shared. Adopting Two-Factor… Expand
Conversions of the left-handed form and the protonated form of DNA back to the bound right-handed form by sanguinarine and ethidium: a comparative study.
The interaction of sanguinarine and ethidium with right-handed (B-form), left-handed (Z-form) and left-handed protonated (designated as H(L)-form) structures of poly(dG-dC).poly(dG-dC) and… Expand
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content
Traditional single-factor authentication possesses several critical security vulnerabilities due to single-point failure feature. Multi-factor authentication (MFA), intends to enhance security by… Expand
All About Phishing: Exploring User Research through a Systematic Literature Review
Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses legitimate risks to businesses, government agencies, and all users due to sensitive data breaches,… Expand