Polymeric Ig receptor: Defender of the fort or Trojan Horse?
نویسنده
چکیده
The polymeric immunoglobulin receptor (pIgR) is important in host defense, transporting antibodies across mucosal epithelial cells. Recent work has shown that, using a protein that binds directly to the pIgR, Streptococcus pneumoniae can co-opt the transcytosis machinery and gain entry into airway epithelial cells.
منابع مشابه
ELT: A Trojan Horse in Disguise?
Many people believe that language teaching is a neutral practice. However, this belief is not without its own opponents. To many scholars, teaching languages cannot be devoid of teaching cultural values of the target language, which tacitly aims at denigrating cultural values of the community of the learners who are learning it. The ultimate purpose of such cultural oppression, according to the...
متن کاملTransfer Reactions and Trojan Horse Method
It is pointed out that the Trojan-Horse method is a suitable tool to investigate subthreshold resonances. TRANSFER REACTIONS AND TROJAN HORSE METHOD A similarity between cross sections for two-body and closely related three-body reactions under certain kinematical conditions [1] led to the introduction of the Trojan-Horse method [2, 3, 4]. In this indirect approach a two-body reaction
متن کاملUDC 621.395:004.491.23, DOI:10.2298/CSIS090330027F Trojan horses in mobile devices
This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a...
متن کاملProtecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs
Digital signatures are a key technology for many Internet-based commercial and administrative applications and, therefore, an increasingly popular target of attacks. Due to their strong cryptographic properties an attacker is more likely to subvert them with malicious software, ie Trojan horse programs. We show that by fusing two techniques, our WORM-supported reliable input method and the Inte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Current Biology
دوره 11 شماره
صفحات -
تاریخ انتشار 2001