Learn More
Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and(More)
Histone deacetylase (HDAC) inhibitors are novel anticancer reagents that have recently been reported to have anti-inflammatory and neuroprotective effects; however, the mechanisms underlying their activities are largely undefined. The data from this study show that the HDAC inhibitor suberoylanilide hydroxamic acid (SAHA) can protect L929 cells from(More)
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t − 1 or less members cannot do the same thing. In 2001, based on a variant of ElGamal digital signature scheme, Li et al. proposed two (t, n) threshold signature schemes with traceable signers. One of their schemes needs(More)
Celastrol, a tripterine derived from the traditional Chinese medicine plant Tripterygium wilfordii Hook F. ("Thunder of God Vine"), has been reported to have multiple effects, such as anti-inflammation, suppression of tumor angiogenesis, inhibition of tumor growth, induction of apoptosis and protection of cells against human neurodegenerative diseases.(More)
High nitrogen nickel-free austenitic stainless steel (HNNF SS) is one of the biomaterials developed recently for circumventing the in-stent restenosis (ISR) in coronary stent applications. To understand the ISR-resistance mechanism, we have conducted a comparative study of cellular and molecular responses of human umbilical vein endothelial cells (HUVECs)(More)
Metastasis is a major cause of death from malignant diseases, and the underlying mechanisms are still largely not known. A detailed probe into the factors which may regulate tumour invasion and metastasis contributes to novel anti-metastatic therapies. We previously identified a novel metastasis-associated gene 1 (mag-1) by means of metastatic phenotype(More)
Password-authenticated key exchange protocols allow two entities who only share a human-memorable password to authenticate each other and agree on a large session key. Most password authenticated key exchange protocols provide an authenticated key exchange between a client and a server based on a pre-shared password. With the development of modern(More)
The concept of concurrent signatures was first introduced by Chen, Kudla and Paterson in Eurocryptpsila04, which allows two entities to produce two ambiguous signatures until an extra piece of information (called keystone) is released by one of the parties. Once the keystone is released, both signatures become binding to their true signers concurrently.(More)
  • 1