Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (5)

Search Parameters:
Keywords = all-or-nothing transforms

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 1436 KB  
Review
Phenomic Microglia Diversity as a Druggable Target in the Hippocampus in Neurodegenerative Diseases
by Daniele Lana, Giada Magni, Elisa Landucci, Gary L. Wenk, Domenico Edoardo Pellegrini-Giampietro and Maria Grazia Giovannini
Int. J. Mol. Sci. 2023, 24(18), 13668; https://doi.org/10.3390/ijms241813668 - 5 Sep 2023
Cited by 10 | Viewed by 4307
Abstract
Phenomics, the complexity of microglia phenotypes and their related functions compels the continuous study of microglia in disease animal models to find druggable targets for neurodegenerative disorders. Activation of microglia was long considered detrimental for neuron survival, but more recently it has become [...] Read more.
Phenomics, the complexity of microglia phenotypes and their related functions compels the continuous study of microglia in disease animal models to find druggable targets for neurodegenerative disorders. Activation of microglia was long considered detrimental for neuron survival, but more recently it has become apparent that the real scenario of microglia morphofunctional diversity is far more complex. In this review, we discuss the recent literature on the alterations in microglia phenomics in the hippocampus of animal models of normal brain aging, acute neuroinflammation, ischemia, and neurodegenerative disorders, such as AD. Microglia undergo phenomic changes consisting of transcriptional, functional, and morphological changes that transform them into cells with different properties and functions. The classical subdivision of microglia into M1 and M2, two different, all-or-nothing states is too simplistic, and does not correspond to the variety of phenotypes recently discovered in the brain. We will discuss the phenomic modifications of microglia focusing not only on the differences in microglia reactivity in the diverse models of neurodegenerative disorders, but also among different areas of the brain. For instance, in contiguous and highly interconnected regions of the rat hippocampus, microglia show a differential, finely regulated, and region-specific reactivity, demonstrating that microglia responses are not uniform, but vary significantly from area to area in response to insults. It is of great interest to verify whether the differences in microglia reactivity may explain the differential susceptibility of different brain areas to insults, and particularly the higher sensitivity of CA1 pyramidal neurons to inflammatory stimuli. Understanding the spatiotemporal heterogeneity of microglia phenomics in health and disease is of paramount importance to find new druggable targets for the development of novel microglia-targeted therapies in different CNS disorders. This will allow interventions in three different ways: (i) by suppressing the pro-inflammatory properties of microglia to limit the deleterious effect of their activation; (ii) by modulating microglia phenotypic change to favor anti-inflammatory properties; (iii) by influencing microglia priming early in the disease process. Full article
(This article belongs to the Special Issue Recent Advances in Microglia Research)
Show Figures

Figure 1

22 pages, 599 KB  
Article
What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage
by Weijing You, Lei Lei, Bo Chen and Limin Liu
Information 2021, 12(4), 142; https://doi.org/10.3390/info12040142 - 26 Mar 2021
Cited by 2 | Viewed by 2980
Abstract
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds. When combining with confidentiality, deduplication will become problematic as encryption performed by different data owners [...] Read more.
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds. When combining with confidentiality, deduplication will become problematic as encryption performed by different data owners may differentiate identical data which may then become not deduplicable. The Message-Locked Encryption (MLE) is thus utilized to derive the same encryption key for the identical data, by which the encrypted data are still deduplicable after being encrypted by different data owners. As keys may be leaked over time, re-encrypting outsourced data is of paramount importance to ensure continuous confidentiality, which, however, has not been well addressed in the literature. In this paper, we design SEDER, a SEcure client-side Deduplication system enabling Efficient Re-encryption for cloud storage by (1) leveraging all-or-nothing transform (AONT), (2) designing a new delegated re-encryption (DRE), and (3) proposing a new proof of ownership scheme for encrypted cloud data (PoWC). Security analysis and experimental evaluation validate security and efficiency of SEDER, respectively. Full article
Show Figures

Figure 1

14 pages, 443 KB  
Article
Integrating Classical Preprocessing into an Optical Encryption Scheme
by Hai Pham, Rainer Steinwandt and Adriana Suárez Corona
Entropy 2019, 21(9), 872; https://doi.org/10.3390/e21090872 - 7 Sep 2019
Cited by 1 | Viewed by 2564
Abstract
Traditionally, cryptographic protocols rely on mathematical assumptions and results to establish security guarantees. Quantum cryptography has demonstrated how physical properties of a communication channel can be leveraged in the design of cryptographic protocols, too. Our starting point is the AlphaEta protocol, which was [...] Read more.
Traditionally, cryptographic protocols rely on mathematical assumptions and results to establish security guarantees. Quantum cryptography has demonstrated how physical properties of a communication channel can be leveraged in the design of cryptographic protocols, too. Our starting point is the AlphaEta protocol, which was designed to exploit properties of coherent states of light to transmit data securely over an optical channel. AlphaEta aims to draw security from the uncertainty of any measurement of the transmitted coherent states due to intrinsic quantum noise. We present a technique to combine AlphaEta with classical preprocessing, taking into account error-correction for the optical channel. This enables us to establish strong provable security guarantees. In addition, the type of hybrid encryption we suggest, enables trade-offs between invoking a(n inexpensive) classical communication channel and a (more complex to implement) optical channel, without jeopardizing security. Our design can easily incorporate fast state-of-the-art authenticated encryption, but in this case the security analysis requires heuristic reasoning. Full article
Show Figures

Figure 1

42 pages, 2820 KB  
Article
Speciation Theory of Carcinogenesis Explains Karyotypic Individuality and Long Latencies of Cancers
by Ankit Hirpara, Mathew Bloomfield and Peter Duesberg
Genes 2018, 9(8), 402; https://doi.org/10.3390/genes9080402 - 9 Aug 2018
Cited by 9 | Viewed by 6752
Abstract
It has been known for over 100 years that cancers have individual karyotypes and arise only years to decades after initiating carcinogens. However, there is still no coherent theory to explain these definitive characteristics of cancer. The prevailing mutation theory holds that cancers [...] Read more.
It has been known for over 100 years that cancers have individual karyotypes and arise only years to decades after initiating carcinogens. However, there is still no coherent theory to explain these definitive characteristics of cancer. The prevailing mutation theory holds that cancers are late because the primary cell must accumulate 3–8 causative mutations to become carcinogenic and that mutations, which induce chromosomal instability (CIN), generate the individual karyotypes of cancers. However, since there is still no proven set of mutations that transforms a normal to a cancer cell, we have recently advanced the theory that carcinogenesis is a form of speciation. This theory predicts carcinogens initiate cancer by inducing aneuploidy, which automatically unbalances thousands of genes and thus catalyzes chain-reactions of progressive aneuploidizations. Over time, these aneuploidizations have two endpoints, either non-viable karyotypes or very rarely karyotypes of new autonomous and immortal cancers. Cancer karyotypes are immortalized despite destabilizing congenital aneuploidy by clonal selections for autonomy—similar to those of conventional species. This theory predicts that the very low probability of converting the karyotype of a normal cell to that of a new autonomous cancer species by random aneuploidizations is the reason for the karyotypic individuality of new cancers and for the long latencies from carcinogens to cancers. In testing this theory, we observed: (1) Addition of mutagenic and non-mutagenic carcinogens to normal human and rat cells generated progressive aneuploidizations months before neoplastic transformation. (2) Sub-cloning of a neoplastic rat clone revealed heritable individual karyotypes, rather than the non-heritable karyotypes predicted by the CIN theory. (3) Analyses of neoplastic and preneoplastic karyotypes unexpectedly identified karyotypes with sets of 3–12 new marker chromosomes without detectable intermediates, consistent with single-step origins. We conclude that the speciation theory explains logically the long latencies from carcinogen exposure and the individuality of cancers. In addition, the theory supports the single-step origins of cancers, because karyotypic autonomy is all-or-nothing. Accordingly, we propose that preneoplastic aneuploidy and clonal neoplastic karyotypes provide more reliable therapeutic indications than current analyses of thousands of mutations. Full article
(This article belongs to the Special Issue Chromosomal Evolution)
Show Figures

Figure 1

20 pages, 560 KB  
Article
Semantic Security with Practical Transmission Schemes over Fading Wiretap Channels
by Linda Senigagliesi, Marco Baldi and Franco Chiaraluce
Entropy 2017, 19(9), 491; https://doi.org/10.3390/e19090491 - 13 Sep 2017
Cited by 2 | Viewed by 5162
Abstract
We propose and assess an on–off protocol for communication over wireless wiretap channels with security at the physical layer. By taking advantage of suitable cryptographic primitives, the protocol we propose allows two legitimate parties to exchange confidential messages with some chosen level of [...] Read more.
We propose and assess an on–off protocol for communication over wireless wiretap channels with security at the physical layer. By taking advantage of suitable cryptographic primitives, the protocol we propose allows two legitimate parties to exchange confidential messages with some chosen level of semantic security against passive eavesdroppers, and without needing either pre-shared secret keys or public keys. The proposed method leverages the noisy and fading nature of the channel and exploits coding and all-or-nothing transforms to achieve the desired level of semantic security. We show that the use of fake packets in place of skipped transmissions during low channel quality periods yields significant advantages in terms of time needed to complete transmission of a secret message. Numerical examples are provided considering coding and modulation schemes included in the WiMax standard, thus showing that the proposed approach is feasible even with existing practical devices. Full article
(This article belongs to the Special Issue Information-Theoretic Security)
Show Figures

Figure 1

Back to TopTop