期刊文献+
共找到725篇文章
< 1 2 37 >
每页显示 20 50 100
Cryptanalysis of efficient semi-quantum secret sharing protocol using single particles
1
作者 高甘 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期254-257,共4页
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three... In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David. 展开更多
关键词 security loophole rearranging orders semi-quantum secret sharing single particles
下载PDF
A verifiable essential secret image sharing scheme based on HLRs(VESIS-(t,s,k,n))
2
作者 Massoud Hadian Dehkordi Seyed Taghi Farahi Samaneh Mashhadi 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期388-410,共23页
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u... In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security. 展开更多
关键词 Bloom Filter CRYPTOGRAPHY Essential Secret Image Sharing Verifiability
下载PDF
Blockchain-Based Key Management Scheme Using Rational Secret Sharing
3
作者 Xingfan Zhao Changgen Peng +1 位作者 Weijie Tan Kun Niu 《Computers, Materials & Continua》 SCIE EI 2024年第4期307-328,共22页
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes... Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities. 展开更多
关键词 Blockchain smart contract rational secret sharing key management
下载PDF
A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
4
作者 Xia Enjun Hu Binjie Shen Qiaoqiao 《China Communications》 SCIE CSCD 2024年第6期163-175,共13页
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther... Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase. 展开更多
关键词 channel autocorrelation function channel probing optimization problem physical layer security secret key generation
下载PDF
A New Double Layer Multi-Secret Sharing Scheme
5
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
下载PDF
Physical-Layer Secret Key Generation for Dual-Task Scenarios
6
作者 Yang Lilin Li Guyue +2 位作者 Guo Tao Xu Hao Hu Aiqun 《China Communications》 SCIE CSCD 2024年第7期252-266,共15页
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou... Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation. 展开更多
关键词 dual-task scenario information-theoretic security physical layer security secret group key generation
下载PDF
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
7
作者 Jinqiu Hou Changgen Peng +1 位作者 Weijie Tan Hongfa Ding 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期917-938,共22页
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ... Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure. 展开更多
关键词 LATTICE learning with errors attribute-based proxy re-encryption linear secret sharing schemes
下载PDF
Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms
8
作者 Keyao Li Yiming Wang +6 位作者 Dapu Pi Baoli Li Haitao Luan Xinyuan Fang Peng Chen Yanqing Lu Min Gu 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第1期28-35,共8页
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since... Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display. 展开更多
关键词 holographic encryption optical secret sharing cascaded liquid crystal hologram multi-dimensional multiplexing
下载PDF
Mannogalactoglucan from mushrooms protects pancreatic islets via restoring UPR and promotes insulin secretion in TIDM mice
9
作者 Ting Liu Si Chen +7 位作者 Yunhe Qu Lujuan Zheng Xiaoxuan Yang Shuhan Men Yuanning Wang Hanrui Ma Yifa Zhou Yuying Fan 《Food Science and Human Wellness》 SCIE CSCD 2024年第3期1390-1401,共12页
Type 1 diabetes mellitus(T1DM) lacks insulin secretion due to autoimmune deficiency of pancreaticβ-cells.Protecting pancreatic islets and enhancing insulin secretion has been therapeutic approaches.Mannogalactoglucan... Type 1 diabetes mellitus(T1DM) lacks insulin secretion due to autoimmune deficiency of pancreaticβ-cells.Protecting pancreatic islets and enhancing insulin secretion has been therapeutic approaches.Mannogalactoglucan is the main type of polysaccharide from natural mushroom,which has potential medicinal prospects.Nevertheless,the antidiabetic property of mannogalactoglucan in T1DM has not been fully elucidated.In this study,we obtained the neutral fraction of alkali-soluble Armillaria mellea polysaccharide(AAMP-N) with the structure of mannogalactoglucan from the fruiting body of A.mellea and investigated the potential therapeutic value of AAMP-N in T1DM.We demonstrated that AAMP-N lowered blood glucose and improved diabetes symptoms in T1DM mice.AAMP-N activated unfolded protein response(UPR) signaling pathway to maintain ER protein folding homeostasis and promote insulin secretion in vivo.Besides that,AAMP-N promoted insulin synthesis via upregulating the expression of transcription factors,increased Ca^(2+) signals to stimulate intracellular insulin secretory vesicle transport via activating calcium/calmodulin-dependent kinase Ⅱ(CamkⅡ) and cAMP/PKA signals,and enhanced insulin secretory vesicle fusion with the plasma membrane via vesicle-associated membrane protein 2(VAMP2).Collectively,these studies demonstrated that the therapeutic potential of AAMP-N on pancreatic islets function,indicating that mannogalactoglucan could be natural nutraceutical used for the treatment of T1DM. 展开更多
关键词 Mannogalactoglucan MUSHROOM Pancreatic islets Insulin secretion Insulin synthesis Unfolded protein response(UPR) Type 1 diabetes mellitus(T1DM)
下载PDF
Molecular investigation of exoU and exoY virulence genes in Pseudomonas aeruginosa collected from hospitalized patients in North of Iran:A descriptive-analytical study
10
作者 Ahmad Reza Moradi Mehrdad Gholami +2 位作者 Lotfollah Davoodi Negar Hajilou Hamid Reza Goli 《Journal of Acute Disease》 2024年第2期74-80,共7页
Objective:To investigate the frequency of exoU and exoY genes in patients with Pseudomonas aeruginosa infection.Methods:In this study,100 clinical isolates of Pseudomonas aeruginosa were collected from patients hospit... Objective:To investigate the frequency of exoU and exoY genes in patients with Pseudomonas aeruginosa infection.Methods:In this study,100 clinical isolates of Pseudomonas aeruginosa were collected from patients hospitalized in educational-therapeutic hospitals and were identified using standard microbiological tests.Then,the antibiotic resistance pattern of the isolates was determined by the disk agar diffusion method.The bacterial DNAs were extracted by the alkaline lysis method.Finally,the presence of exoU and exoY genes was evaluated by the PCR test.Results:In this study,47%,72%,29%,39%,40%,and 44%of the isolates were non-susceptible to piperacillin,aztreonam,ceftazidime,imipenem,tobramycin,and ciprofloxacin,respectively.In addition,95%and 93%of the clinical isolates carried the exoU and exoY genes.Blood and fecal isolates had both virulence genes,while only one wound isolate had neither genes.Meanwhile,all urinary isolates contained the exoY gene and only one isolate lacked the exoU gene.Also,88 isolates simultaneously had both exoU and exoY genes.Conclusions:High prevalence of exoU and exoY genes in this region indicates a significant role of typeⅢsecretion system in pathogenesis of Pseudomonas aeruginosa.The typeⅢsecretion system may be a suitable target to reduce the pathogenicity of this bacterium. 展开更多
关键词 Pseudomonas aeruginosa exoU exoY Virulence gene TypeⅢsecretion system PCR
下载PDF
Mogroside IIE,an in vivo metabolite of sweet agent,alleviates acute lung injury via Pla2g2a-EGFR inhibition
11
作者 Weichao Lü Guoqing Ren +2 位作者 Kuniyoshi Shimizu Renshi Li Chaofeng Zhang 《Food Science and Human Wellness》 SCIE CSCD 2024年第1期299-312,共14页
In the face of increasingly serious environmental pollution,the health of human lung tissues is also facing serious threats.Mogroside IIE(M2E)is the main metabolite of sweetening agents mogrosides from the anti-tussiv... In the face of increasingly serious environmental pollution,the health of human lung tissues is also facing serious threats.Mogroside IIE(M2E)is the main metabolite of sweetening agents mogrosides from the anti-tussive Chinese herbal Siraitia grosvenori.The study elucidated the anti-inflammatory action and molecular mechanism of M2E against acute lung injury(ALI).A lipopolysaccharide(LPS)-induced ALI model was established in mice and MH-S cells were employed to explore the protective mechanism of M2E through the western blotting,co-immunoprecipitation,and quantitative real time-PCR analysis.The results indicated that M2E alleviated LPS-induced lung injury through restraining the activation of secreted phospholipase A2 type IIA(Pla2g2a)-epidermal growth factor receptor(EGFR).The interaction of Pla2g2a and EGFR was identified by co-immunoprecipitation.In addition,M2E protected ALI induced with LPS against inflammatory and damage which were significantly dependent upon the downregulation of AKT and m TOR via the inhibition of Pla2g2a-EGFR.Pla2g2a may represent a potential target for M2E in the improvement of LPS-induced lung injury,which may represent a promising strategy to treat ALI. 展开更多
关键词 Mogroside IIE Acute lung injury Secreted phospholipase A2 type IIA(Pla2g2a) Epidermal growth factor receptor(EGFR)
下载PDF
The Effect of Umami Stimulation on Salivary Secretion Rate and Duration
12
作者 Eri Sambuichi Rumi Nishimura +1 位作者 Shiho Morishita Shigeru Watanabe 《Health》 2024年第1期52-59,共8页
Purpose: Umami reportedly promotes salivation. We aimed to investigate the effects of taste stimuli on slow and fast salivary secretion in humans using umami, sweet, and sour stimuli. Methods: Eight healthy women part... Purpose: Umami reportedly promotes salivation. We aimed to investigate the effects of taste stimuli on slow and fast salivary secretion in humans using umami, sweet, and sour stimuli. Methods: Eight healthy women participated between 14:00 and 15:00, taking the circadian rhythm of salivary secretion into account. The types and concentrations of the taste solutions were glutamic acid (1.7 × 10<sup>−3</sup> M), inosinic acid (9.8 × 10<sup>−3</sup> M), and guanylic acid (9.8 × 10<sup>−3</sup> M) for umami stimulation, citric acid (6.5 × 10<sup>−3</sup> M) for acidity stimulation, and sucrose (1.6 × 10<sup>−2</sup> M) for sweetness stimulation. First, the unstimulated salivary flow rate was measured. Then, 3 ml of a flavor solution was dropped under the tongue using a syringe. The saliva was expelled into an aluminum cup every minute and weighed. The first minute’s value minus 3 ml flavor solution was the stimulated salivary secretion rate produced by each flavor. The time-to-return to the initial unstimulated salivary flow rate was the duration of the stimulated saliva secretion rate. Results: The mean unstimulated salivary flow rate across participants was 0.64 ± 0.25 ml/min (range: 0.23 - 1.03 ml/min). The highest amount of saliva was induced by citric acid. There were significant differences between citric acid and the other flavor solutions (p < 0.05 for glutamic acid, inosinic acid, and sucrose;p < 0.01 for guanylic acid). There were no significant differences in duration of salivation between the flavor solutions. When the participants were divided into slow (0.45 ± 0.16 ml/min) and fast groups (0.83 ± 0.15 ml/min) based on their median resting salivary secretion rate, there were no significant differences between the two groups in the amount of saliva secreted at 1 minute after stimulation and the duration of the salivary secretion rate. Conclusion: Umami stimulation was effective in slowing salivary secretion and sustaining salivary secretion after stimulation. 展开更多
关键词 Salivary Secretion Umami Flavor Oral Health Stimulated Salivary Secretion
下载PDF
A Thematic Analysis of the Novel Open Secrets from Psychoanalysis Perspective
13
作者 LI Zai-xin 《Journal of Literature and Art Studies》 2024年第2期109-117,共9页
Alice Munro,the first short story writer in Canada to receive the Nobel Prize laureate in 2013,applies the unconscious to the portrayal of characters and the construction of engrossing stories.Based on the unconscious... Alice Munro,the first short story writer in Canada to receive the Nobel Prize laureate in 2013,applies the unconscious to the portrayal of characters and the construction of engrossing stories.Based on the unconscious theory of Sigmund Freud’s psychoanalysis,this article focuses on one of Alice Munro’s short stories,Open Secrets,by analyzing the unconscious of representative characters,to explore their power conversion through the conflicts triggered by their unconscious mind.Via uncovering their unique personalities and values,as well as displaying their power against each other through conflict,this article reveals that the relationship between characters is sophisticated and changeable,and their power against each other has been a state of change in continuous conflicts.Behind the unconscious displays a thoroughly different comparison of forces:the strong who behaves violently and arrogantly actually shows weakness;in turn,the obedience and endurance of the weak strongly manifest a tenacious resistance. 展开更多
关键词 Open Secrets PSYCHOANALYSIS UNCONSCIOUS thematic analysis
下载PDF
Dietary Green Tea Extract and Antioxidants Improve Insulin Secretory Functions of Pancreatic β-Cells in Mild and Severe Experimental Rodent Model of Chronic Pancreatitis
14
作者 Galande Sheethal Ranjeet K. Tokala +7 位作者 Pavan Pondugala Krishna Vemula Vijayalakshmi Venkatesan Pothani Suresh Surya Satyanarayana Singh Guduru Venkat Rao Duvvur Nageshwar Reddy Mitnala Sasikala 《Open Journal of Endocrine and Metabolic Diseases》 2024年第2期53-72,共20页
Chronic pancreatitis (CP) is a progressive inflammatory disorder of the pancreas. It is predominantly idiopathic (with an unknown cause) in India and mostly due to alcohol in the West. Diabetes that occur secondary to... Chronic pancreatitis (CP) is a progressive inflammatory disorder of the pancreas. It is predominantly idiopathic (with an unknown cause) in India and mostly due to alcohol in the West. Diabetes that occur secondary to chronic pancreatitis (T3c Diabetes) is often brittle, and is difficult to attain normoglycemia with conventional treatment requiring multiple doses of insulin. Mild and severe model of CP was induced in mice by repeated intraperitoneal injections of cerulein and L-arginine respectively with an intent to study islet dysfunction and develop therapeutic strategy in animal models of CP. Dietary intervention of epigallocatechin-3-gallate (EGCG) was tested in both the models of CP for its beneficial effects on insulin secretory functions. Pancreata collected upon euthanasia were used to study alterations in the morphology of pancreatic parenchyma and inflammation by staining with H&E and fibrotic changes by Masson’s trichrome and picrosirius staining. Insulin secretory functions of islets were evaluated to test the efficacy of the dietary intervention on β-cell functions. Intraperitoneal glucose tolerance test was performed to monitor the glucose homeostasis before and after the dietary intervention. Both the models resulted in CP with dispersed acini, inflammation and fibrosis. The loss of acini and extent of fibrosis was more in L-arginine model. 2-fold improvement in glucose-stimulated insulin secretory functions of islets was observed with 0.5% EGCG dietary intervention in cerulein model of CP and 1.6-fold in L-arginine model of CP. A further improvement in insulin secretion by 3.2-fold was observed with additional dietary supplements like N-acetyl cysteine, curcumin in combination with EGCG. Our results thus demonstrate and highlight the therapeutic potential of dietary green tea (EGCG) supplementation in reversing islet dysfunction and improving glucose homeostasis in experimental chronic pancreatitis in mice. 展开更多
关键词 Dietary Intervention C57BL6/J Mice Epigallocatechin-3-Gallate N-Acetyl Cysteine Curcumin Chronic Pancreatitis ISLETS Glucose Stimulated Insulin Secretion
下载PDF
On Translation of Children’s Literature Based on Reception Aesthetics:A Case Study of The Secret Garden
15
作者 HOU Wen-lan LI Ju-yuan 《Journal of Literature and Art Studies》 2024年第3期194-200,共7页
Grounded in reader-centered theories,Reception Aesthetics prioritizes the active engagement and acceptance of target readers.This study examines the translation of children’s literature through the lens of Reception ... Grounded in reader-centered theories,Reception Aesthetics prioritizes the active engagement and acceptance of target readers.This study examines the translation of children’s literature through the lens of Reception Aesthetics,using Li Wenjun’s rendition of The Secret Garden as a case study.The objective is to scrutinize various aspects of the translation-including vocabulary,syntax,rhetorical devices,and cultural nuances-and to discern how the adaptation and application of diverse translation strategies cater to the aesthetic expectations. 展开更多
关键词 Reception Aesthetics translation of children’s literature The Secret Garden
下载PDF
Skeletal Muscle Expresses and Secretes Apolipoprotein A-I
16
作者 Huina Zhang, Yang Wang, Huimin Na, Fuquan Yang, Pingsheng Liu Institute of Biophysics, Chinese Academy of Sciences, Beijing 100101, China 《生物物理学报》 CAS CSCD 北大核心 2009年第S1期241-242,共2页
Apolipoprotein A-I (apoA-I), the principal apolipoprotein of high density lipoprotein (HDL) particle, has been the subject of intense investigation because of its
关键词 Skeletal Muscle Expresses and secretes Apolipoprotein A-I
原文传递
Cyberattack Ramifications, The Hidden Cost of a Security Breach
17
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity Breaches Data Breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
The hypoglycemic potential of phenolics from functional foods and their mechanisms 被引量:2
18
作者 Oksana Golovinskaia Chin-Kun Wang 《Food Science and Human Wellness》 SCIE CSCD 2023年第4期986-1007,共22页
Long-term postprandial hyperglycemia is a primary risk factor for developing chronic metabolic diseases such as obesity,type 2 diabetes,and cardiovascular disease.Chronic hyperglycemia induces the glycation of protein... Long-term postprandial hyperglycemia is a primary risk factor for developing chronic metabolic diseases such as obesity,type 2 diabetes,and cardiovascular disease.Chronic hyperglycemia induces the glycation of proteins,oxidative stress,inflammation and increases plasma insulin and lipid concentrations.Insulin resistance is the primary cause of postprandial excursions of blood glucose and lipids.Hyperglycemia can be treated by lowering dietary carbohydrates intake,digestion,and absorption.Various functional foods improve glucose metabolism by increasing insulin sensitivity and inhibitingα-glucosidase in the small intestine.Natural phytochemicals,especially active phenolics are good antioxidants and show anti-inflammatory action and regulate blood glucose.This review aimed to report on hypoglycemic properties of active phenolics from functional foods and their proposed anti-diabetic mechanisms.Nevertheless,further clinical trials are required to confirm the bioavailability,safety,and efficacy of phenolics,especially the dosage and duration of treatment,to avoid adverse effects and give better dietary recommendations. 展开更多
关键词 Phenolics Functional foods HYPOGLYCEMIA Insulin resistance Insulin secretion
下载PDF
Chronic spinal cord compression associated with intervertebral disc degeneration in SPARC-null mice 被引量:2
19
作者 Zhuo-Yao Li Ai-Fang Zhou +8 位作者 Gan Li Long-Yun Zhou Pei-Min Pu Ke Zhu Zhong Zheng Yong-Jun Wang Qian-Qian Liang Min Yao Xue-Jun Cui 《Neural Regeneration Research》 SCIE CAS CSCD 2023年第3期634-642,共9页
Chronic spinal cord compression(CSCC)is induced by disc herniation and other reasons,leading to movement and sensation dysfunction,with a serious impact on quality of life.Spontaneous disc herniation rarely occurs in ... Chronic spinal cord compression(CSCC)is induced by disc herniation and other reasons,leading to movement and sensation dysfunction,with a serious impact on quality of life.Spontaneous disc herniation rarely occurs in rodents,and therefore establishing a chronic spinal cord compression(CSCC)animal model is of crucial importance to explore the pathogenesis and treatment of CSCC.The absence of secreted protein,acidic,and rich in cysteine(SPARC)leads to spontaneous intervertebral disc degeneration in mice,which resembles human disc degeneration.In this study,we evaluated whether SPARC-null mice may serve as an animal model for CSCC.We performed rod rotation test,pain threshold test,gait analysis,and Basso Mouse Scale score.Our results showed that the motor function of SPARC-null mice was weakened,and magnetic resonance images revealed compression at different spinal cord levels,particularly in the lumbar segments.Immunofluorescence staining and western blot assay showed that the absence of SPARC induced apoptosis of neurons and oligodendrocytes,activation of microglia/macrophages with M1/M2 phenotype and astrocytes with A1/A2 phenotype;it also activated the expression of the NOD-like receptor protein 3 inflammasome and inhibited brain-derived neurotrophic factor/tyrosine kinase B signaling pathway.Notably,these findings are characteristics of CSCC.Therefore,we propose that SPARC-null mice may be an animal model for studying CSCC caused by disc herniation. 展开更多
关键词 apoptosis ASTROCYTES chronic spinal cord compression disc degeneration disc herniation macrophages microglia NEUROINFLAMMATION neurons NOD-like receptor protein 3 inflammasomes secreted protein acidic and rich in cysteine
下载PDF
Secondary bile acids and the biliary epithelia: The good and the bad 被引量:1
20
作者 Ilaria Lenci Martina Milana +2 位作者 Alessandro Signorello Giuseppe Grassi Leonardo Baiocchi 《World Journal of Gastroenterology》 SCIE CAS 2023年第2期357-366,共10页
The biliary tract has been considered for several decades a passive system just leading the hepatic bile to the intestine.Nowadays several researches demonstrated an important role of biliary epithelia(i.e.cholangiocy... The biliary tract has been considered for several decades a passive system just leading the hepatic bile to the intestine.Nowadays several researches demonstrated an important role of biliary epithelia(i.e.cholangiocytes)in bile formation.The study of biliary processes therefore maintains a continuous interest since the possible important implications regarding chronic cholestatic human diseases,such as primary biliary cholangitis or primary sclerosing cholangitis.Bile acids(BAs),produced by the liver,are the most represented organic molecules in bile.The physiologic importance of BAs was initially attributed to their behavior as natural detergents but several studies now demonstrate they are also important signaling molecules.In this minireview the effect of BAs on the biliary epithelia are reported focusing in particular on secondary(deriving by bacterial manipulation of primary molecules)ones.This class of BAs is demonstrated to have relevant biological effects,ranging from toxic to therapeutic ones.In this family ursodeoxycholic and lithocholic acid present the most interesting features.The molecular mechanisms linking ursodeoxycholic acid to its beneficial effects on the biliary tract are discussed in details as well as data on the processes leading to lithocholic damage.These findings suggest that expansion of research in the field of BAs/cholangiocytes interaction may increase our understanding of cholestatic diseases and should be helpful in designing more effective therapies for biliary disorders. 展开更多
关键词 CHOLANGIOCYTES Biliary secretion CHOLESTASIS Bile acids Secondary bile acids Ursodeoxycholic acid Lithocholic acid
下载PDF
上一页 1 2 37 下一页 到第
使用帮助 返回顶部