期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Protecting Terminals by Security Domain Mechanism Based on Trusted Computing 被引量:5
1
作者 ZHOU Zheng ZHANG Jun +1 位作者 LI Jian LIU Yi 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1437-1440,共4页
Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch att... Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch attack or virus can be invoked in those terminals would be the most effec tive way to protect information systems. The concept of trusted computing was first introduced into terminal virus immunity. Then a model of security domain mechanism based on trusted computing to protect computers from proposed from abstracting the general information systems. The principle of attack resistant and venture limitation of the model was demonstrated by means of mathematical analysis, and the realization of the model was proposed. 展开更多
关键词 trusted computing security domain mechanism attack immunity venture limitation
在线阅读 下载PDF
Aetiopathogenesis of autoimmune hepatitis 被引量:23
2
作者 Diego Vergani Giorgina Mieli-Vergani 《World Journal of Gastroenterology》 SCIE CAS CSCD 2008年第21期3306-3312,共7页
The histological hallmark of autoimmune hepatitis(AIH) is a dense portal mononuclear cell infiltrate that invades the surrounding parenchyma and comprises T and B lymphocytes,macrophages,and plasma cells.An unknown ... The histological hallmark of autoimmune hepatitis(AIH) is a dense portal mononuclear cell infiltrate that invades the surrounding parenchyma and comprises T and B lymphocytes,macrophages,and plasma cells.An unknown but powerful stimulus must be promoting the formation of this massive inflammatory cellular reaction that is likely to initiate and perpetuate liver damage.An autoimmune attack can follow different pathways to inflict damage on hepatocytes.Liver damage is likely to be orchestrated by CD4^+ T lymphocytes recognizing an autoantigenic liver peptide.To trigger an autoimmune response,the peptide must be embraced by an HLA class Ⅱ molecule and presented to naive CD4^+ T helper(Th0) cells by professional antigen presenting cells,with the co-stimulation of ligand-ligand fostering interaction between the two cells.Th0 cells become activated,differentiate into functional phenotypes according to the cytokines prevailing in the microenvironment and the nature of the antigen,and initiate a cascade of immune reactions determined by the cytokines produced by the activated T cells.Th1 cells,arising in the presence of the macrophage-derived interleukin(IL) -12,secrete mainly IL-2 and interferon-gamma(IFN-γ),which activate macrophages,enhance expression of HLA classⅠ(increasing liver cell vulnerability to a CD8^+ T cell cytotoxic attack),and induce expression of HLA class Ⅱ molecules on hepatocytes.Th2 cells,which differentiate from Th0 if the microenvironment is rich in IL-4,produce mainly IL-4,IL-10,and IL-13 which favour autoantibody production by B lymphocytes.Physiologically,Th1 and Th2 antagonize each other.Th17 cells,a recently described population,arise in the presence of transforming growth factor beta(TGF-β) and IL-6 and appear to have an important effector role in inflammation and autoimmunity.Theprocess of autoantigen recognition is strictly controlled by regulatory mechanisms,such as those exerted by CD4^+CD25^+ regulatory T cells,which derive from Th0 in the presence of TGF-β,but in the absence of IL-6.If regulatory mechanisms fail,the autoimmune attack is perpetuated.Over the past three decades different aspects of the above pathogenic scenario have been investigated.In particular,a defect in immunoregulation affecting CD4^+CD25^+ regulatory T cells(T-regs) has been demonstrated in AIH,particularly at diagnosis or during relapse.Advances in the study of autoreactive T cells have occurred mostly in AIH type 2,since the knowledge that CYP2D6 is the main autoantigen has enabled the characterization of both CD4 and CD8 T cells targeting this cytochrome.CD4 T cells from patients with type 2 AIH positive for the predisposing HLA allele DRB10701 recognize seven regions of CYP2D6,five of which are also recognized by CD8 T cells.High numbers of IFN-γ producing CD4 T cells and CD8 T cells are associated with biochemical evidence of liver damage,suggesting a combined cellular immune attack. 展开更多
关键词 Autoimmune hepatitis Aetiopathogenesis Lymphocyte Cellular immune attack Histocompatibility lymphocyte antigen
暂未订购
On Algebraic Immunity of Trace Inverse Functions on Finite Fields of Characteristic Two 被引量:1
3
作者 FENG Xiutao GONG Guang 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2016年第1期272-288,共17页
The trace inverse functions Tr(λx^(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC... The trace inverse functions Tr(λx^(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC) presented by Si W and Ding C(2012),etc.In order to evaluate the security of those ciphers in resistance to(fast) algebraic attacks,the authors need to characterize algebraic properties of Tr(λx^(-1)).However,currently only some bounds on algebraic immunity of Tr(λx^(-1)) are given in the public literature,for example,the NGG upper bound and the Bayev lower bound,etc.This paper gives the exact value of the algebraic immunity of Tr(λx^(-1)) over F_(2~n),that is,AI(Tr(λx^(-1))) =[2n^(1/2)]- 2,where n ≥ 2,A ∈ F_(2~n) and λ≠ 0,which shows that Dalai's conjecture on the algebraic immunity of Tr(λx^(-1)) is correct.What is more,the authors demonstrate some weak properties of Tr(λx^(-1)) against fast algebraic attacks. 展开更多
关键词 Algebraic immunity boolean functions fast algebraic attacks trace inverse functions
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部