Learn More
Side-channels enable attackers to break a cipher by exploiting observable information from the cipher program's execution to infer its secret key. While some defenses have been proposed to protect information leakage due to certain side channels, the effectiveness of these defenses have mostly been given only qualitative analysis by their authors. It is(More)
Alzheimer's disease (AD) is characterized pathologically by the deposition of amyloid-beta peptides (Abeta), neurofibrillary tangles, distinctive neuronal loss and neurite dystrophy. Nerve growth factor (NGF) has been suggested to be involved in the pathogenesis of AD, however, the role of its precursor (proNGF) in AD remains unknown. In this study, we(More)
In this study, the motor deficit, cognition impairment and the vulnerability of different striatal interneurons to the 6-hydroxydopamine (6-OHDA)-induced excitotoxicity in unilateral medial forebrain bundle (MFB) lesion rats were analyzed by employing behavioral test, immunohistochemistry and Western blot methods. The apomorphine-induced rotation after MFB(More)
Huntington's disease (HD) is a neurological degenerative disease and quinolinic acid (QA) has been used to establish HD model in animals through the mechanism of excitotoxicity. Yet the specific pathological changes and the underlying mechanisms are not fully elucidated. We aimed to reveal the specific morphological changes of different striatal neurons in(More)
BACKGROUND Melatonin has shown a protective effect against various oxidative damages in the nervous system. Our previous studies have also confirmed its effect on behavioral dysfunction of experimental rats and injury of striatal interneurons induced by 3-nitropropionic acid. The present study aimed to further determine the effect of melatonin on the injury(More)
Location-based social networks (LBSNs) feature friend discovery by location proximity that has attracted hundreds of millions of users world-wide. While leading LBSN providers claim the well-protection of their users' location privacy, for the first time we show through real world attacks that these claims do not hold. In our identified attacks, a malicious(More)