Learn More
Existing protocols for archival systems make use of verifiability of shares in conjunction with a proactive secret sharing scheme to achieve high availability and long term confidentiality, besides data integrity. In this paper, we extend an existing protocol (Wong et al. [2002]) to take care of more realistic situations. For example, it is assumed in the(More)
Protocols for secure archival storage are becoming increasingly important as the use of digital storage for sensitive documents is gaining wider practice. In [8], Wong et al. combined verifiable secret sharing with proactive secret sharing without reconstruction and proposed a verifiable secret redistribution protocol for long term storage. However, their(More)
BACKGROUND The first line anti-tubercular (anti-TB) treatment normally involves isoniazid, rifampicin, pyrazinamide, and ethambutol. Clearance of these drugs depends on the activity of several enzymes such as N-acetyl transferase 2, cytochrome P450 oxidase and glutathione S-transferase (GST). Some of these enzymes are highly polymorphic leading to(More)
Despite the traditional use of Couroupita guianensis (CG) to treat various ailments, it had been less exploited from ethnopharmacological perspective. The aim of the present study was to evaluate aqueous and methanolic extract of CG for its anxiolytic activity in mice.Swiss albino male mice were orally administered both aqueous and methanolic extracts of CG(More)
  • 1