AIM: To evaluate the efflicacy and tolerability of an extended treatment protocol and to determine the predictors of sustained virological response (SVR) after liver transplantation (LT).METHODS: Between August 2005 a...AIM: To evaluate the efflicacy and tolerability of an extended treatment protocol and to determine the predictors of sustained virological response (SVR) after liver transplantation (LT).METHODS: Between August 2005 and November 2008, patients with recurrent hepatitis C virus (HCV) after LT were selected for treatment if liver biopsy showed at least grade 2 inflammation and/or stage 2 flibrosis. All patients were to receive pegylated interferon (PEG)/regimens combining ribavirin (RBV) for an additional 48 wk after HCV undetectability.RESULTS: Extended protocol treatment was initiated in thirty patients. Overall, 73% had end of treatmentresponse and 60% had SVR. Nineteen patients completed treatment per protocol, of them, sixteen (84%) had end of treatment response, and fourteen (74%) achieved SVR. Both early virological response and 24-week virological response were individually associated with SVR but this association was not signif icant on multivariate analysis. Eleven patients (37%) discontinued therapy due to adverse effects. Cytopenias were the most common and most severe adverse effect, and required frquent growth factor use, dose adjustments and treatment cessations. The risk of rejection was not increased.CONCLUSION: Recurrent HCV after LT can be safely treated with extended virological responseguided therpy using PEG/RBV, but requires close monitoring for treatment-related adverse effects, particularly cytopenias.展开更多
Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Att...Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 "An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps", Nonlinear Dynamics 77(7): 399-411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.'s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server's public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications.展开更多
This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using t...This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using the extended Kailar logic, the security analysis of the improved prototocol has been presented. Key words non-repudiation protocol - extended Kailar logic - converse assumption procedure CLC number TP 393. 08 Foundation item: Supported by the National Natural Science Foundation of China (90104005) and the Doctoral Science Foundation of Ministry of Education (20020486046)Biography: Li Li(1976-), female, Ph. D candidate, research direction: network security and formal analysis of security protocol.展开更多
This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, system...This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model.展开更多
目的构建脑卒中偏瘫患者中医延续护理方案,为脑卒中偏瘫患者中医延续护理实践提供参考。方法在文献分析的基础上,采用德尔菲法对20名专家进行2轮函询。结果2轮专家函询问卷回收率分别为100%和95%。最终构建了含6个一级条目,20个二级条目...目的构建脑卒中偏瘫患者中医延续护理方案,为脑卒中偏瘫患者中医延续护理实践提供参考。方法在文献分析的基础上,采用德尔菲法对20名专家进行2轮函询。结果2轮专家函询问卷回收率分别为100%和95%。最终构建了含6个一级条目,20个二级条目,52个三级条目的脑卒中偏瘫患者中医特色延续护理方案,权威系数分别为0.860和0.900,Kendall s W分别为0.280和0.319,P<0.01。结论本研究构建的脑卒中偏瘫患者中医特色延续护理方案,结果可靠、科学,具有一定的可行性。展开更多
文摘AIM: To evaluate the efflicacy and tolerability of an extended treatment protocol and to determine the predictors of sustained virological response (SVR) after liver transplantation (LT).METHODS: Between August 2005 and November 2008, patients with recurrent hepatitis C virus (HCV) after LT were selected for treatment if liver biopsy showed at least grade 2 inflammation and/or stage 2 flibrosis. All patients were to receive pegylated interferon (PEG)/regimens combining ribavirin (RBV) for an additional 48 wk after HCV undetectability.RESULTS: Extended protocol treatment was initiated in thirty patients. Overall, 73% had end of treatmentresponse and 60% had SVR. Nineteen patients completed treatment per protocol, of them, sixteen (84%) had end of treatment response, and fourteen (74%) achieved SVR. Both early virological response and 24-week virological response were individually associated with SVR but this association was not signif icant on multivariate analysis. Eleven patients (37%) discontinued therapy due to adverse effects. Cytopenias were the most common and most severe adverse effect, and required frquent growth factor use, dose adjustments and treatment cessations. The risk of rejection was not increased.CONCLUSION: Recurrent HCV after LT can be safely treated with extended virological responseguided therpy using PEG/RBV, but requires close monitoring for treatment-related adverse effects, particularly cytopenias.
基金Project supported by the National Natural Science Foundation of China(Grant No.61462033)
文摘Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 "An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps", Nonlinear Dynamics 77(7): 399-411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.'s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server's public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications.
文摘This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using the extended Kailar logic, the security analysis of the improved prototocol has been presented. Key words non-repudiation protocol - extended Kailar logic - converse assumption procedure CLC number TP 393. 08 Foundation item: Supported by the National Natural Science Foundation of China (90104005) and the Doctoral Science Foundation of Ministry of Education (20020486046)Biography: Li Li(1976-), female, Ph. D candidate, research direction: network security and formal analysis of security protocol.
文摘This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model.
文摘目的构建脑卒中偏瘫患者中医延续护理方案,为脑卒中偏瘫患者中医延续护理实践提供参考。方法在文献分析的基础上,采用德尔菲法对20名专家进行2轮函询。结果2轮专家函询问卷回收率分别为100%和95%。最终构建了含6个一级条目,20个二级条目,52个三级条目的脑卒中偏瘫患者中医特色延续护理方案,权威系数分别为0.860和0.900,Kendall s W分别为0.280和0.319,P<0.01。结论本研究构建的脑卒中偏瘫患者中医特色延续护理方案,结果可靠、科学,具有一定的可行性。