γ-Glutamyltranspeptidase-catalysed acyl-transfer to the added acceptor does not proceed via the ping-pong mechanism

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

proceed via the Ping-Pong mechanism

Acyl-transfer catalysed by y-glutamyltranspeptidase from bovine kidney was studied using y-Land y-D-Glu-p-nitroanilide as the donor and GlyGly as the acceptor. The transfer of the y-Glu group to GlyGly was shown to be accompanied by transfer of the y-Glu group to water (hydrolysis). The results were compared with acyl-transfer catalysed by the representative serine protease, a-chymotrypsin. The...

متن کامل

Ping-pong electron transfer through DNA.

Ping-Pong Electron Transfer through DNA Benjamin Elias, Prof. , Joseph C. Genereux , Jacqueline K. Barton, Prof. 1 * Division of Chemistry and Chemical Engineering, California Institute of Technology, Pasadena, CA 91125 (USA), Fax: (+1) 626 577 4976 Chimie Organique et Médicinale, Université catholique de Louvain (Belgium) email: Jacqueline K. Barton ([email protected]) Correspondence to Jac...

متن کامل

Ping pong in the pore

Getting to the inner circle ontiguity between the ER and the nuclear envelope means nuclear membrane proteins have a direct shot to their target. In fact, inner nuclear membrane (INM) proteins were thought to need only to diffuse to the nucleus, pass through the nuclear pore, and then be retained by nuclear-localized binding partners. But new results suggest a more active process. Suraj Saksena...

متن کامل

Attack the ‘ping-pong’ protocol without eavesdropping

Qing-yu Cai Wuhan Institute of Physics and Mathematics, The Chinese Academy of Sciences, Wuhan, 430071, People’s Republic of China Bostr .. om and Felbinger [1] have presented a ping-pong communication protocol which allows the information transferred in a deterministic secure manner. The security of this ping-pong protocol is based on an entangled pair of qubits. And the proof of the case of e...

متن کامل

On the Security of Ping-Pong Protocols

Consider the class of protocols, for two participants, in which the initiator applies a sequence of operators to a message M and sends it to the other participant ; in each step, one of the participants applies a sequence of operators to the message received last, and sends it back . This "ping-pong" action continues several times, using sequences of operators as specified by the protocol . The...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Biochemical Journal

سال: 1994

ISSN: 0264-6021,1470-8728

DOI: 10.1042/bj3040869