Results 1 - 10
of
3,017
Vascular permeability factor (vascular endothelial growth factor gene is expressed differentially in normal tissues, macrophages and tumors
- MA BiA Cell. 3:211
, 1992
"... Persistent microvascular hyperpermeability to plasma proteins even after the cessation of injury is a characteristic but poorly understood feature of normal wound healing. It results in extravasation of fibrinogen that clots to form fibrin, which serves as a provisional matrix and promotes angiogene ..."
Abstract
-
Cited by 367 (9 self)
- Add to MetaCart
angiogenesis and scar formation. We present evidence indicating that vascular permeability factor (VPF; also known as vascular endothelial growth factor) may be responsible for the hyperpermeable state, as well as the angiogenesis, that are characteristic of healing wounds. Hyperpermeable blood vessels were
Democracy, technocracy, and the secret state of medicines control: expert and nonexpert perspectives
- Science, Technology, & Human Values
, 1997
"... This article explores the social frameworks guiding expert and nonexpert perspectives on medicines safety in the U.K. Scientific experts from the Committee on the Safety of Medicines and the Medicines Commission were interviewed, and three nonexpertgroups, including patients and health professionals ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
that there is substantial divergence between expert and nonexpert perspectives on medicines regulation, and that this derives as much from value differences as from any informational deficits. However, there seems to be some scope for shared values between some experts and some nonexperts, especially as regards state
2005 ), ‘ Secret State, Transparent Subject: The Australian Security Intelligence Organisation
- in the Age of Terror ’ , Australian and New Zealand Journal of Criminology , 38 : 400 – 15
"... This article describes the secrecy provisions embodied in the AustralianSecurity Intelligence Organisation Legislation Amendment Act 2003 (Cwlth). The article explains how these provisions curb freedom of speech and remove ASIO’s activities from the domain of public scrutiny. It argues that by effec ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
that the increase in state secrecy and its impact are part of a continuing shift in the relative distrib-ution of power between state and subject in liberal democracies; a shift that signals a move to more repressive or authoritarian forms of rule. The ‘war on terror ’ and its pursuit abroad and in the ‘homeland
Weaknesses in the Key Scheduling Algorithm of RC4
- PROCEEDINGS OF THE 4TH ANNUAL WORKSHOP ON SELECTED AREAS OF CRYPTOGRAPHY
, 2001
"... In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance. We identify a large number of weak keys, in which knowledge of a small number of key bits suffices to determine many state and output bits with non-negligible probabilit ..."
Abstract
-
Cited by 270 (1 self)
- Add to MetaCart
In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance. We identify a large number of weak keys, in which knowledge of a small number of key bits suffices to determine many state and output bits with non
Adipose tissue, inflammation, and cardiovascular disease. Circ Res
"... Abstract—Mounting evidence highlights the role of adipose tissue in the development of a systemic inflammatory state that contributes to obesity-associated vasculopathy and cardiovascular risk. Circulating mediators of inflammation participate in the mechanisms of vascular insult and atheromatous ch ..."
Abstract
-
Cited by 215 (0 self)
- Add to MetaCart
Abstract—Mounting evidence highlights the role of adipose tissue in the development of a systemic inflammatory state that contributes to obesity-associated vasculopathy and cardiovascular risk. Circulating mediators of inflammation participate in the mechanisms of vascular insult and atheromatous
Secure communication over fading channels
, 2007
"... The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from rec ..."
Abstract
-
Cited by 186 (21 self)
- Add to MetaCart
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from
Dimensions and Principles of Declassification
, 2005
"... Computing systems often deliberately release (or declassify) sensitive information. A principal security concern for systems permitting information release is whether this release is safe: is it possible that the attacker compromises the information release mechanism and extracts more secret informa ..."
Abstract
-
Cited by 142 (16 self)
- Add to MetaCart
Computing systems often deliberately release (or declassify) sensitive information. A principal security concern for systems permitting information release is whether this release is safe: is it possible that the attacker compromises the information release mechanism and extracts more secret
Leakage-resilient cryptography
- In Proceedings of the 49th IEEE Symposium on Foundation of Computer Science
, 2008
"... We construct a stream-cipher S whose implementation is secure even if a bounded amount of arbitrary (adversarially chosen) information on the internal state of S is leaked dur-ing computation. This captures all possible side-channel attacks on S where the amount of information leaked in a given peri ..."
Abstract
-
Cited by 143 (9 self)
- Add to MetaCart
given K1,...,Kℓ−1, f1(τ1),..., fℓ−1(τℓ−1) and also the complete internal state of S after Kℓ has been computed (i.e. S is forward-secure). The construction is based on alternating extraction (used in the intrusion-resilient secret-sharing scheme from FOCS’07). We move this concept to the computational
UPPAAL Implementation Secrets
, 2002
"... In this paper we present the continuous and on-going development of datastructures and algorithms underlying the veri cation engine of the tool Uppaal. In particular, we review the datastructures of Dierence Bounded Matrices, Minimal Constraint Representation and Clock Dierence Diagrams used in ..."
Abstract
-
Cited by 44 (14 self)
- Add to MetaCart
in symbolic state-space representation and-analysis for real-time systems.
Quantum secret sharing,
- Physical Review A,
, 1999
"... Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. We show how this procedure can be implemented using GreenbergerHorne-Zeilinger ͑GHZ͒ states. In the quantum case the presence of an eavesdrop ..."
Abstract
-
Cited by 35 (0 self)
- Add to MetaCart
Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. We show how this procedure can be implemented using GreenbergerHorne-Zeilinger ͑GHZ͒ states. In the quantum case the presence
Results 1 - 10
of
3,017