نتایج جستجو برای: helper

تعداد نتایج: 22871  

1996
Ian Goldberg David A. Wagner Randi Thomas Eric A. Brewer

Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises signi cant security concerns. Therefore, it is desirable to create a secure environment to contain ...

Journal: :FASEB journal : official publication of the Federation of American Societies for Experimental Biology 1989
K A Roth R G Lorenz R A Unanue C T Weaver

Recent investigations have shown that the neuroendocrine and immune systems profoundly affect each other. In part, these interactions occur via common chemical messengers and receptors. One possible shared chemical messenger is the opioid precursor preproenkephalin, for which high concentrations of messenger RNA are present in brain, adrenal, and activated T helper cells. Because the biologic a...

2014
Daniel B. Graham Douglas G. Osborne Joshua T. Piotrowski Timothy S. Gomez Grzegorz B. Gmyrek Holly M. Akilesh Adish Dani Daniel D. Billadeau Wojciech Swat

Immature dendritic cells (DCs) maintain a highly dynamic pool of recycling MHCII that promotes sampling of environmental antigens for presentation to T helper cells. However, the molecular basis of MHCII recycling and the cellular machinery that orchestrates MHCII trafficking are incompletely understood. Using a mouse model we show that WASH, an actin regulatory protein that facilitates retrome...

Journal: :The Journal of Experimental Medicine 1986
A A Like C A Biron E J Weringer K Byman E Sroczynski D L Guberski

Diabetes-prone BioBreeding/Worcester (BB/Wor) rats received thrice weekly injections of mAb against antigens expressed on the surface of all T cells (OX19), cytotoxic/suppressor, and NK cells (OX8), helper/inducer cells (W3/25, OX35, OX38), and Ia+ cells (OX6, 3JP, OX17). Treatment with OX8 or OX19 achieved stable reductions of splenic and peripheral blood NK cells and helper/inducer T lymphocy...

Journal: :The Journal of general virology 1992
F Hans M Fuchs L Pinck

A set of full-length cDNA clones of the satellite RNA of grapevine fanleaf nepovirus isolate F13 (GFLV-F13) was constructed with a variable number of additional, non-viral nucleotides at the 5' and 3' ends. The biological activity of the RNAs transcribed from these constructs was tested in Chenopodium quinoa protoplasts using a helper virus. When inoculated with arabis mosaic virus S (ArMV-S) R...

Journal: :The Journal of general virology 1971
G J Kelloff R J Huebner R V Gilden

Non-transforming helper viruses were isolated from pools of two hamsterspecific sarcoma viruses in which isolations by terminal dilution procedures had previously been unsuccessful. This presumably resulted from approximately equivalent levels of sarcoma and helper viruses in the original pools. Helper virus was isolated from morphologically normal cells selected from tissue culture plates show...

Journal: :Journal of virology 2000
W B Young C J Link

Most retroviral packaging cell lines were established by a helper virus plasmid cotransfected with a separate plasmid encoding a selection marker. Since this selection marker coexisted in trans with the helper virus sequence, helper virus gene expression could be inactivated by host DNA methylation despite selection for the cotransfected selection marker. We have reported that DNA methylation c...

Journal: :The Journal of Experimental Medicine 1982
J-A Keene J Forman

B6.T1a(a) (Qa-1(a)) mice that are primed in vivo and restimulated in vitro with Qa-1 congenic spleen cells from B6 (Qa-1(b)) animals are unable to generate anti-Qa-1(b) cytotoxic T lymphocytes (CTL). This nonresponsive pattern was observed regardless of the route of immunization or the time of testing in vitro. Although B6.T1a(a) mice are nonresponders to Qa-1(b) when presented on B6 cells, the...

Journal: :Cryptography 2022

This paper defines a new practical construction for code-based signature scheme. We introduce protocol that is designed to follow the recent paradigm known as “Sigma with helper”, and prove protocol’s security reduces directly Syndrome Decoding Problem. The then converted full-fledged scheme via sequence of generic steps include: removing role helper; incorporating variety optimizations (using ...

Journal: :IEEE Transactions on Information Forensics and Security 2021

In this paper, we study fundamental trade-offs in privacy-preserving biometric identification systems with noisy enrollment. The proposed include helper data, secret keys, and private keys. Helper data are stored a public database used for identification. Secret keys either secure or provided to the user, can be next step, e.g. authentication. Private by users, also impose enrollment channel an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید