Learn More
Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and(More)
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same thing. In 2001, based on a variant of ElGamal digital signature scheme, Li et al. proposed two (t, n) threshold signature schemes with traceable signers. One of their schemes needs(More)
Histone deacetylase (HDAC) inhibitors are novel anticancer reagents that have recently been reported to have anti-inflammatory and neuroprotective effects; however, the mechanisms underlying their activities are largely undefined. The data from this study show that the HDAC inhibitor suberoylanilide hydroxamic acid (SAHA) can protect L929 cells from(More)
RGD (Arg-Gly-Asp) motif toxin proteins from snake venoms, saliva glands secretion of leech or tick have typical characteristics of inhibiting platelet aggregation, angiogenesis, and tumor growth. Here we report cloning and characterization of a novel RGD-toxin protein from the buccal gland of Lampetra japonica. In an attempt to study the activities of(More)
Celastrol, a tripterine derived from the traditional Chinese medicine plant Tripterygium wilfordii Hook F. ("Thunder of God Vine"), has been reported to have multiple effects, such as anti-inflammation, suppression of tumor angiogenesis, inhibition of tumor growth, induction of apoptosis and protection of cells against human neurodegenerative diseases.(More)
High nitrogen nickel-free austenitic stainless steel (HNNF SS) is one of the biomaterials developed recently for circumventing the in-stent restenosis (ISR) in coronary stent applications. To understand the ISR-resistance mechanism, we have conducted a comparative study of cellular and molecular responses of human umbilical vein endothelial cells (HUVECs)(More)
Password-authenticated key exchange protocols allow two entities who only share a human-memorable password to authenticate each other and agree on a large session key. Most password authenticated key exchange protocols provide an authenticated key exchange between a client and a server based on a pre-shared password. With the development of modern(More)
Cell migration is an early-stage and critical step for cancer metastasis. The most common approach to monitor this process is wound-healing assay. However, this traditional method has some unavoidable limitations. We observed that simply scratching the monolayer of cultured cells might cause local cell damage around the injury line. The cells along the(More)
The concept of concurrent signatures was first introduced by Chen, Kudla and Paterson in Eurocryptpsila04, which allows two entities to produce two ambiguous signatures until an extra piece of information (called keystone) is released by one of the parties. Once the keystone is released, both signatures become binding to their true signers concurrently.(More)
Metastasis is a major cause of death from malignant diseases, and the underlying mechanisms are still largely not known. A detailed probe into the factors which may regulate tumour invasion and metastasis contributes to novel anti-metastatic therapies. We previously identified a novel metastasis-associated gene 1 (mag-1) by means of metastatic phenotype(More)
  • 1