Learn More
Secure computation undeniably received a lot of attention in the recent years, with the shift toward cloud computing offering a new incentive for secure computation and outsourcing. Surprisingly little attention, however, has been paid to computation with non-integer data types. To narrow this gap, in this work we develop efficient solutions for computation(More)
Secure computation on private data has been an active area of research for many years and has received a renewed interest with the emergence of cloud computing. In recent years, substantial progress has been made with respect to the efficiency of the available techniques and several implementations have appeared. The available tools, however, lacked a(More)
BACKGROUND Mice with defects in the Klotho gene exhibit multiple aging phenotypes including arteriosclerosis. We hypothesised that the G-395A polymorphism in the promoter region of the human Klotho gene may contribute to the prevalence of Essential Hypertension (EH). METHODS We investigate whether the G-395A polymorphism of Klotho is associated with EH in(More)
The emergence and availability of remote storage providers prompted work in the security community that allows a client to verify integrity and availability of the data she outsourced to an untrusted remove storage server at a relatively low cost. Most recent solutions to this problem allow the client to read and update (insert, modify, or delete) stored(More)
CDDO-Me, initiated in a phase II clinical trial, is a potential useful therapeutic agent for cancer and inflammatory dysfunctions, whereas the therapeutic efficacy of CDDO-Me on LPS-induced acute lung injury (ALI) has not been reported as yet. The purpose of the present study was to explore the protective effect of CDDO-Me on LPS-induced ALI in mice and to(More)
Five tacrine-ferulic acid hybrids (6a-e) were designed and synthesized as multi-potent anti-Alzheimer drug candidates. All target compounds have better acetylcholinesterase inhibitory activity and comparable butyrylcholinesterase inhibitory activity in relation to tacrine. Interestingly, 6d showed a reversible and non-competitive inhibitory action for(More)
The emergence and wide availability of remote storage service providers prompted work in the security community that allows clients to verify integrity and availability of the data that they outsourced to a not fully trusted remote storage server at a relatively low cost. Most recent solutions to this problem allow clients to read and update (i.e., insert,(More)
The recent rapid growth in the availability and popularity of cloud services allows for convenient on demand remote storage and computation. Security and privacy concerns, however, are among the top impediments standing in the way of wider adoption of cloud technologies. That is, in addition to the new security threats that emerge with the adoption of new(More)
Eukaryotic initiation factors 3 (EIF3) complex is essential for initiation of protein synthesis for both cells and virus. It consists of 13 subunits (EIF3A to M), among which EIF3B serves as a major scaffolding subunit. However, its functions in human glioblastoma have not been explored yet. Here, we showed that EIF3B was expressed in human glioblastoma(More)