期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
A Therapeutic Sheep in Metastatic Wolf’s Clothing: Trojan Horse Approach for Cancer Brain Metastases Treatment 被引量:2
1
作者 Hai-jun Liu Mingming Wang +2 位作者 Shanshan Shi Xiangxiang Hu Peisheng Xu 《Nano-Micro Letters》 SCIE EI CAS CSCD 2022年第7期140-156,共17页
Early-stage brain metastasis of breast cancer(BMBC), due to the existence of an intact blood–brain barrier(BBB), is one of the deadliest neurologic complications. To improve the efficacy of chemotherapy for BMBC, a T... Early-stage brain metastasis of breast cancer(BMBC), due to the existence of an intact blood–brain barrier(BBB), is one of the deadliest neurologic complications. To improve the efficacy of chemotherapy for BMBC, a Trojan horse strategy-based nanocarrier has been developed by integrating the cell membrane of a brain-homing cancer cell and a polymeric drug depot. With the camouflage of a MDA-MB-231/Br cell membrane, doxorubicin-loaded poly(D, L-lactic-co-glycolic acid) nanoparticle(DOX-PLGA@CM) shows enhanced cellular uptake and boosted killing potency for MDA-MB-231/Br cells. Furthermore, DOX-PLGA@CM is equipped with naturally selected molecules for BBB penetration, as evidenced by its boosted capacity in entering the brain of both healthy and early-stage BMBC mouse models. Consequently, DOX-PLGA@CM effectively reaches the metastatic tumor lesions in the brain, slows down cancer progression, reduces tumor burden, and extends the survival time for the BMBC animal.Furthermore, the simplicity and easy scale-up of the design opens a new window for the treatment of BMBC and other brain metastatic cancers. 展开更多
关键词 trojan horse Brain metastasis Blood-brain barrier Cell membrane NANOMEDICINE
下载PDF
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography 被引量:1
2
作者 Richard E Overill Jantje A M Silomon +1 位作者 Kam-Pui Chow Hayson Tse 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期9-15,共7页
The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hy... The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hypothetical Trojan Horse author to be included in quantifying the relative plausibility of competing explanations for the existence of uncontested digital evidence.This new model has been applied to the case of the Trojan Horse defence( THD) against the possession of child pornography.Our results demonstrate that the THD in this case cannot be plausibly sustained unless it can be shown that an ‘off-theshelf'( OTS) Trojan Horse for this task is available and it is not detectable by the target computer,at the material time. 展开更多
关键词 trojan Horse defence child pornography digital forensic evidence complexity quantitative plausibility metrics posterior odds
下载PDF
Dynamic(2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication 被引量:1
3
作者 赖红 Orgun A.Mehmet +2 位作者 肖井华 Pieprzyk Josef 薛理银 《Communications in Theoretical Physics》 SCIE CAS CSCD 2015年第4期459-465,共7页
In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised... In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. 展开更多
关键词 (2 3) threshold quantum state sharing RECURRENCE distributed fountain codes EFFICIENCY trojan horse attacks
原文传递
The synthesis and antibacterial activity evaluation of oxazolidinone-deferasirox conjugates 被引量:1
4
作者 Xintong Zhao Yuhua Hu +3 位作者 Tong Qin Tianlei Li Wenxuan Zhang Song Wu 《Journal of Chinese Pharmaceutical Sciences》 CAS CSCD 2022年第12期946-952,共7页
We reported herein the synthesis and antibacterial activity evaluation of two oxazolidinone-deferasirox conjugates with different linkers that were designed based on the“Trojan horse”strategy.The conjugates could co... We reported herein the synthesis and antibacterial activity evaluation of two oxazolidinone-deferasirox conjugates with different linkers that were designed based on the“Trojan horse”strategy.The conjugates could combine with Fe^(3+)ions as the deferasirox.However,both conjugates were inactive against tested bacteria,including S.aureus,E.coli,A.baumannii,and P.aeruginosa.The results suggested that the synthesized iron chelator deferasirox was not suitable as a siderophore of the bacteria to transport the antibiotic,or the coupling linker of the synthesized conjugates could not be hydrolyzed to release the oxazolidinone in the cytoplasm.Therefore,the design and synthesis of oxazolidinone-deferasirox conjugates need further exploration. 展开更多
关键词 OXAZOLIDINONE DEFERASIROX ANTIBACTERIAL SIDEROPHORE trojan horse”strategy
原文传递
An Arbitrated Quantum Signature Scheme without Entanglement
5
作者 Hui-Ran Li Ming-Xing Luo +1 位作者 Dai-Yuan Peng Xiao-Jun Wang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第9期317-322,共6页
Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontriviai scheme has attracted great interests because o~ its... Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontriviai scheme has attracted great interests because o~ its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks. 展开更多
关键词 arbitrated quantum signature UNFORGEABILITY NON-REPUDIATION trojan horse attack DoS attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部