Dissertations / Theses on the topic 'RSA signature'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 49 dissertations / theses for your research on the topic 'RSA signature.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Misarsky, Jean-Francois. "Cryptanalyse et specification de schemas de signature rsa avec redondance." Caen, 1999. http://www.theses.fr/1999CAEN2043.
Full textKoshta, Prashant Kumar, and Shailendra Singh Thakur. "A Novel Authenticity of an Image Using Visual Cryptography." IJCSN, 2012. http://hdl.handle.net/10150/219514.
Full textA digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy and complex computations to generate and verify the keys and signatures. In 1995, Naor and Shamir proposed a visual cryptography (VC) for binary images. VC has high security and requires simple computations. The purpose of this thesis is to provide an alternative to the current digital signature technology. We introduce a new digital signature scheme based on the concept of a non-expansion visual cryptography. A visual digital signature scheme is a method to enable visual verification of the authenticity of an image in an insecure environment without the need to perform any complex computations. We proposed scheme generates visual shares and manipulates them using the simple Boolean operations OR rather than generating and computing large and long random integer values as in the conventional digital signature schemes currently in use.
Seyed, Saboonchi Nima. "Hardware Security Module Performance Optimization by Using a "Key Pool" : Generating keys when the load is low and saving in the external storage to use when the load is high." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-158122.
Full textDetta examensarbete undersöker prestandabegränsningar för Hardware Security Module (HSM) enheter med avseende på att uppfylla behov av säkerhetstjänster i en snabbt växande marknad och på ett kostnadseffektivt sätt. I synnerhet på grund av de säkerhetskrav som nu existerar/tillkommit efter införandet av ett nytt elektroniskt ID-system i Sverige (Federationen för Svensk eID) och hur underskrifter skapas och hanteras. SafeNet Luna SA 1700 är en högpresterande HSM enhet tillgänglig på marknaden. I den här avhandlingen presenteras nuvarande HSM kapacitet och en omfattande analys av resultatet visar ett prestanda gap mellan vad HSMS för närvarande kan göra och vad som behöver förbättras för att ta itu med de förväntade kraven. En fallstudie fokuserad på nya säkerhetstjänster som krävs i och med Sveriges nya e-Identifiering presenteras. Baserat på resultatet i den här avhandlingen föreslås en optimerad HSM lösning för att tillgodose prestanda gapet mellan vad HSM presterar och de nya krav som ställs. Ett flertal tester genomfördes för att mäta en befintlig HSM prestanda. En analys av dessa mätningar användes för att föreslå en optimerad lösning för HSMS (eller liknande) enheter. Ett av de huvudsakliga kraven för den nya signeringstjänsten är att ha en kapacitet av 50 digitala signaturer inom en accepterad svarstidsintervall, vilket är 300ms vid ordinarie trafik och 3000ms vid högtrafik. Förslagen i avhandlingen möjliggör HSM enheten att tillgodose kraven på 50 signeringen per sekund under två timmars högtrafik, och till en 1/9 kostnad genom att skala upp antalet HSMs. Målgruppen i den här avhandlingen är användare av HSMs och där behovet av lagring och generering av nycklar i höga volymer är stort. Även HSM leverantörer som kan implementera den här optimeringen/lösningen i befintlig funktionalitet för att tillgodose det här behovet i en alltmer växande marknad.
Magri, Bernardo Caraponale. "Assinatura digital Rabin-Williams - sem randomização e com prova eficiente de segurança." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-10092012-165253/.
Full textWith the development of public-key cryptography, many efforts were made to build encryption and signature protocols that were provably secure against malicious adversaries. There are many definitions of security for encryption and signature protocols, and there are many adversary models to simulate the behaviour of a malicious adversary against a given protocol. The Rabin family of signature protocols has the speed records for verification of signature, being up to 100 times faster than RSA. This work presents a tight security proof in the random oracle model for a variant of the Rabin signature protocol presented by Bernstein, that does not require the use of pseudo-random bits, making the protocol more robust. The proof presented here is a polynomially tight reduction for the problem of integer factorization to the problem of breaking the Principal Rabin-Williams B = 0 protocol.
Valkaitis, Mindaugas. "Efektyvios šifravimo bei skaitmeninio parašo sistemos." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171717-30545.
Full textThis submission called “Efficient encryption and digital signature schemes” consists of three parts. I. In Part I theoretical analysis of popular public key cryptosystems RSA (Rivest, Shamir, Adleman) with security based on the large integer factorization problem and ElGamal with security based on the discrete logarithm problem, along with new cryptographic primitive termed as "signcryption" proposed by Y. Zheng which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly smaller than that required by "signature followed by encryption" using popular public key cryptosystem composition is done. For the completeness of analysis description of supplemental algorithms and functions such as AES block cipher, SHA hash functions, HMAC keyed hash function is present. II. In Part II the results of the practical implementation done in Python programming language are analyzed. Effectiveness is described by two factors: 1. Total computation time of signing – encryption – decryption – verification operations; 2. Communication overhead – signed and encrypted message length increase compared to the original plaintext. III. In Part III two effective Signcryption implementation algorithms are proposed: secret sharing without threshold and (k, n) threshold schemes. Results of analysis prove Signcryption being secure and extremely effective signature and encryption cryptosystem. It has very low... [to full text]
Kratochvíl, Martin. "Zabezpečený přenos dat pomocí čarových kódů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-412838.
Full textBalaževič, Lukáš. "Mechanismy zabezpečení OS Android s využitím jazyka Kotlin." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413001.
Full textBeran, Martin. "Elektronická podatelna VUT 2." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2007. http://www.nusl.cz/ntk/nusl-412777.
Full textTomaz, Antonio Emerson Barros. "Resgate de autoria em esquemas de assinatura em anel." reponame:Repositório Institucional da UFC, 2014. http://www.repositorio.ufc.br/handle/riufc/10842.
Full textSubmitted by Marlene Sousa (mmarlene@ufc.br) on 2015-02-27T18:29:04Z No. of bitstreams: 1 2014_dis_aebtomaz.pdf: 1072067 bytes, checksum: 405260d86425363feaec1802b2775de1 (MD5)
Approved for entry into archive by Marlene Sousa(mmarlene@ufc.br) on 2015-03-04T16:09:55Z (GMT) No. of bitstreams: 1 2014_dis_aebtomaz.pdf: 1072067 bytes, checksum: 405260d86425363feaec1802b2775de1 (MD5)
Made available in DSpace on 2015-03-04T16:09:55Z (GMT). No. of bitstreams: 1 2014_dis_aebtomaz.pdf: 1072067 bytes, checksum: 405260d86425363feaec1802b2775de1 (MD5) Previous issue date: 2014-05-23
The proposal presented in this thesis represents an expansion of the original concept of ring signature. A ring signature scheme allows a member of a group to publish a message anonymously, so that each member of the group can be considered the author of the message. The main idea of a ring signature is to guarantee the anonymity of the subscriber also ensure the authenticity of information, showing that the message came from one of the members of that group. This thesis presents a signature scheme based on (RIVEST et al., 2001), where the subscriber can later revoke anonymity presenting secret values that prove that he would only be able to generate such a signature. This property will be referred to here as rescue of authorship. The main difference to the proposal of Rivest et al. (2001) is presented before we even begin signature generation. The values used as input to the trapdoor function are message authentication codes - MACs generated by the HMAC algorithm, an algorithm for message authentication based on hash function collision resistant. This simple modification will allow, in the future, the subscriber to reveal itself as the true author of the message by showing the secret values to generate those MACs.
A proposta apresentada nesta dissertação representa uma expansão do conceito original de assinatura em anel. Um esquema de assinatura em anel permite que um membro de um grupo divulgue uma mensagem anonimamente, de tal forma que cada um dos membros do grupo seja considerado o possível autor da mensagem. A ideia principal de uma assinatura em anel é garantir o anonimato do assinante e ainda garantir a autenticidade da informação, mostrando que a mensagem partiu de um dos membros do referido grupo. Esta dissertação apresenta um esquema de assinatura em anel baseado no esquema de Rivest et al. (2001), em que o assinante pode, mais tarde, revogar seu anonimato apresentando valores secretos que provam que somente ele seria capaz de gerar tal assinatura. Esta propriedade será chamada aqui de resgate de autoria. A principal diferença em relação ao trabalho de Rivest et al. (2001) é apresentada antes mesmo de começar a geração da assinatura. Os valores utilizados como entrada para a função trapdoor serão códigos de autenticação de mensagem - MACs gerados pelo algoritmo HMAC, um algoritmo de autenticação de mensagem baseado em função hash resistente à colisão. Essa modificação simples permitirá que, no futuro, o assinante revele-se como o verdadeiro autor da mensagem apresentando os valores secretos que geraram os MACs.
Krisell, Martin. "Elliptic Curve Digital Signatures in RSA Hardware." Thesis, Linköpings universitet, Informationskodning, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-81084.
Full textEn digital signatur är den elektroniska motsvarigheten till en handskriven signatur. Den kan bevisa källa och integritet för valfri data, och är ett verktyg som blir allt viktigare i takt med att mer och mer information hanteras digitalt. Digitala signaturer använder sig av två nycklar. Den ena nyckeln är hemlig och tillåter ägaren att signera data, och den andra är offentlig och tillåter vem som helst att verifiera signaturen. Det är, under förutsättning att nycklarna är tillräck- ligt stora och att det valda systemet är säkert, omöjligt att hitta den hemliga nyckeln utifrån den offentliga. Eftersom en signatur endast är giltig för datan som signerades innebär detta också att det är omöjligt att förfalska en digital signatur. Den mest välanvända konstruktionen för att skapa digitala signaturer idag är RSA, som baseras på det svåra matematiska problemet att faktorisera heltal. Det finns dock andra matematiska problem som anses vara ännu svårare, vilket i praktiken innebär att nycklarna kan göras kortare, vilket i sin tur leder till att mindre minne behövs och att beräkningarna går snabbare. Ett sådant alternativ är att använda elliptiska kurvor. Det underliggande matematiska problemet för kryptering baserad på elliptiska kurvor skiljer sig från det som RSA bygger på, men de har en viss struktur gemensam. Syftet med detta examensarbete var att utvärdera hur elliptiska kurvor presterar jämfört med RSA, på ett system som är designat för att effektivt utföra RSA. De funna resultaten är att metoden med elliptiska kurvor ger stora fördelar, även om man nyttjar hårdvara avsedd för RSA, och att dessa fördelar ökar mångfaldigt om speciell hårdvara används. För några användarfall av digitala signaturer kan, under några år framöver, RSA fortfarande vara fördelaktigt om man bara tittar på hastigheten. För de flesta fall vinner dock elliptiska kurvor, och kommer troligen vara dominant inom kort.
Vychodil, Petr. "Softwarová podpora výuky kryptosystémů založených na problému faktorizace velkých čísel." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218146.
Full textHauserová, Markéta. "Elektronické zabezpečení zdravotnické dokumentace v prostředí zdravotnického IS." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236445.
Full textHiromasa, Ryo. "Efficient Fully Homomorphic Encryption and Digital Signatures Secure from Standard Assumptions." 京都大学 (Kyoto University), 2017. http://hdl.handle.net/2433/225736.
Full textMullani, Nowsheen. "An RNA Signature Links Oxidative Stress To Cellular Senescence." Electronic Thesis or Diss., Sorbonne université, 2019. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2019SORUS560.pdf.
Full textOxidative Stress is one of the routes leading to cellular senescence. While the damages that reactive oxygen species inflict on proteins and DNA are well described, our insight on how transcription may participate in the onset of senescence is still limited. At a transcriptional level, oxidative stress results in accumulation of promoter RNAs (uaRNAs) and enhancer RNAs (eRNAs) as a consequence of defective release of the RNAPII from the chromatin a phenomenon known as RNAPII crawling. We observed that RNAPII crawling was also detected downstream of a small series of genes known to be regulated by HP1Υ at the level of their termination. Exploring this phenomenon yielded an unexpected result in the sense that it revealed an inhibiting effect of hydrogen peroxide on the RNA exosome complex involved in degradation of polyadenylated RNAs. The crawling RNAPII results in the transcription of ALU sequences located in the neighborhood of promoters and enhancers and downstream of intron-less genes and of small series of intron-containing genes. As ALU sequences contain genome encoded A tracts, they should normally be degraded by the RNA exosome. Yet, as oxidative stress also inhibits this RNAse activity, mRNAs containing serendipitously transcribed ALU sequences get stabilized and are detected in the cytoplasm and even polysome fractions. This phenomenon may participate in the onset of the interferon response associated with oxidative stress
Pavel, Lukáš. "Elektronický geocaching." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220639.
Full textHarling, Leanne. "Investigating the micro-RNA and metabolic signature of human postoperative atrial fibrillation." Thesis, Imperial College London, 2014. http://hdl.handle.net/10044/1/29130.
Full textMahi, Naim. "Connectivity Analysis of Single-cell RNA-seq Derived Transcriptional Signatures." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613748441148963.
Full textHossain, Mahmud. "Characterization of non-protein coding ribonucleic acids by their signature digestion products and mass spectrometry." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1204947468.
Full textHauenschild, Ralf [Verfasser]. "RNA-Seq and CoverageAnalyzer reveal sequence dependent reverse transcription signature of N-1-methyladenosine / Ralf Hauenschild." Mainz : Universitätsbibliothek Mainz, 2017. http://d-nb.info/1129476375/34.
Full textBachtík, Martin. "Online validace záznamů DNSSEC." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-412834.
Full textMustafi, Debarshi. "Genetic Signatures of the Retina in Health and Disease." Case Western Reserve University School of Graduate Studies / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=case1372776307.
Full textJohnson, Benny, Laurence Cooke, and Daruka Mahadevan. "Next generation sequencing identifies ‘interactome’ signatures in relapsed and refractory metastatic colorectal cancer." PIONEER BIOSCIENCE PUBL CO, 2017. http://hdl.handle.net/10150/623288.
Full textHernandez-Ferrer, Carles 1987. "Bioinformatic tools for exposome data analysis : application to human molecular signatures of ultraviolet light effects." Doctoral thesis, Universitat Pompeu Fabra, 2017. http://hdl.handle.net/10803/572046.
Full textMost common diseases are caused by a combination of genetic, environmental and lifestyle factors. These diseases are referred to as complex diseases. Examples of this type of diseases are obesity, asthma, hypertension or diabetes. Several empirical evidence suggest that exposures are necessary determinants of complex disease operating in a causal background of genetic diversity. Moreover, environmental factors have long been implicated as major contributors to the global disease burden. This leads to the formulation of the exposome, that contains any exposure to which an individual is subjected from conception to death. The study of the underlying mechanics that links the exposome with human health is an emerging research field with a strong potential to provide new insights into disease etiology. The first part of this thesis is focused on ultraviolet radiation (UVR) exposure. UVR exposure occurs from both natural and artificial sources. UVR includes three subtypes of radiation according to its wavelength (UVA 315-400 nm, UVB 315-295 nm, and UVC 295-200 nm). While the main natural source of UVR is the Sun, UVC radiation does not reach Earth's surface because of its absorption by the stratospheric ozone layer. Then, exposures to UVR typically consist of a mixture of UVA (95%) and UVB (5%). Effects of UVR on human can be both beneficial and detrimental, depending on the amount and form of UVR. Detrimental and acute effects of UVR include erythema, pigment darkening, delayed tanning and thickening of the epidermis. Repeated UVR-induced injury to the skin, may ultimately predispose one to the chronic effects photoaging, immunosuppression, and photocarcinogenesis. The beneficial effect of UVR is the cutaneous synthesis of vitamin D. Vitamin D is necessary to maintain physiologic calcium and phosphorous for normal bone mineralization and to prevent rickets, osteomalacia, and osteoporosis. But the exposome paradigm is to work with multiple exposures at a time and with one or more health outcomes rather focus in a single exposures analysis. This approach tends to be a more accurate snapshot of the reality that we live in complex environments. Then, the second part is focused on the tools to explore how to characterize and analyze the exposome and how to test its effects in multiple intermediate biological layers to provide insights into the underlying molecular mechanisms linking environmental exposures to health outcomes.
Gendron, Judith. "Les longs ARN non codants, une nouvelle classe de régulateurs génomique tissu-spécifique : signature moléculaire spécifique des neurones dopaminergiques et sérotoninergiques." Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066518.
Full textOnly 1.2% of the genome codes for proteins; 98.8% is thus non-coding, despite 93% of the human genome being actively transcribed, mostly in long non-coding RNA (lncRNA).These lncRNA constitute a new class of genomic regulator capable of acting at all levels of gene expression and their expression is highly tissue-specific,modulated during the time and under normal/pathological conditions.Thus, we propose that each specified cell expresses a specific repertoire of lncRNA correlated to open/active chromatin regions specifying its cellular identity.In this context, we isolated by FACS 2neural types involved in many pathologies: i) human dopaminergic neurons (nDA) differentiated from hiPS and ii) DA and serotoninergic (n5-HT) neurons. From these 2neural types, we identified 1,363 lncRNA in nDA (among which 989 new, whether 73%) constituting the repertoire of nDA, and 1,257 lncRNA (among which 719 new) constituting the repertoire of n5-HT. Moreover,their comparison has shown that only 194 lncRNA are common to both neural types:thus the majority of lncRNA is expressed either in nDA or in n5-HT, indicating a high degree of cell-specificity.In addition, 39% of open chromatin regions, potentially regulatory, were also not detected in the n5-HT.Thus, we have generated DA and 5-HT specific catalogues of non-coding elements of the genome, which constitute DA and 5-HT specific molecular signatures, that could participate in deepening our knowledge regarding nDA or n5-HT development and dysfunctions. With this in mind,these DA specific elements have been compared with the SNP described as Parkinson Disease risk variants and candidate lncRNA were selected to perform studies of function
Aligerová, Zuzana. "Molekulární signatura jako optimální multi-objektivní funkce s aplikací v predikci v onkogenomice." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220727.
Full textCastleberry, Colette M. "Quantitative Identification of Non-coding RNAs by Isotope Labeling and LC-MS/MS." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1258474676.
Full textDeprez, Marie. "Étude de l’hétérogénéité cellulaire et des dynamiques de régénération de l’épithélium respiratoire sain par analyses des signatures transcriptionnelles sur cellules uniques." Electronic Thesis or Diss., Université Côte d'Azur (ComUE), 2019. http://www.theses.fr/2019AZUR6022.
Full textImprovements made in nucleic acid sequencing and cell handling technologies now offer the opportunity to analyze simultaneously the content of numerous single cells (RNA, DNA, ...) by global and unbiased approaches. This single-cell ‘omics’ revolution provides a new framework to revisit the “Cell Theory”, elaborated over several centuries, and essentially based on morphological and functional features. The many cell modalities now accessible at single- cell level, such as their transcriptome, spatial localization, developmental trajectories, enrich considerably this definition, and set a renewed context to precisely reassess the definition of ‘cell types’, ‘cell states’ as well as their different interactions and fates.My thesis work initially set up ad hoc approaches and statistical framework to analyze appropriately these single-cell data, which deeply differ from standard bulk RNA-seq. High variance, presence of a huge percentage of null values, large volume of data are among the specific characteristics of these datasets. My work was centered on the main experimental model of my host laboratory, e.g. the human airway epithelium. Human airways are lined by a pseudostratified epithelium mainly composed of basal, secretory, goblet and multiciliated cells. Airways also constitute a true cellular ecosystem, in which the epithelial layer interacts closely with immune and mesenchymal cells. This coordination between cells ensures proper defense of the respiratory system and its correct regeneration in case of external aggression and injuries. A better understanding of the operating sequences in normal and physiopathological situations is relevant in pathologies such as chronic obstructive pulmonary disease, asthma or cystic fibrosis.First, I characterized at a single cell level the precise and cell-specific sequence of events leading to functional regeneration of the epithelium, using a 3D model of human cells. I then built a single-cell atlas of the different cell types that are lining healthy human airways from the nose to the 12th generation of bronchi.By applying computational and statistical approaches, I have identified cell lineage hierarchies and was able to reconstruct a comprehensive cell trajectory roadmap in human airways. I not only confirmed previously described cell lineages, but I have also discovered a novel trajectory that links goblet cells to multiciliated cells, identifying novel cell populations and molecular interactors involved in the process of healthy human airway epithelium regeneration. The profiling of 12 healthy volunteers then generated a dataset of 77,969 cells, derived from 35 distinct locations. The resulting atlas is composed of more than 26 epithelial, immune and stromal cell types demonstrating the cellular heterogeneity present in the airways. Its analysis has revealed a strong proximo-distal gradient of expression in suprabasal, secretory, or multiciliated cells between the nose and lung airways. My work has also improved the characterization of rare cells, including “hillock” cells that have been previously described in mice.In conclusion, this work probably represents one of the first single-cell investigations in human airways. It brings original contributions to our understanding of differentiation’s dynamics and cellular heterogeneity in healthy human airways. The resulting resource will be extremely useful for any future single-cell investigators and also for establishing a very useful joint between clinical and biological works. As such, it will constitute a reference in any future project aiming to precisely analyze specific disease conditions
Jebbawi, Fadi. "Etude des lymphocytes T régulateurs naturels CD8+CD25+: signature micro-ARN et effets des micro-ARNs sur l'expression de FOXP3, CTLA-4 et GARP." Doctoral thesis, Universite Libre de Bruxelles, 2014. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209338.
Full textNous avons purifié les CD8+CD25+ nTregs et vérifié par cytométrie de flux leur expression en FOXP3 et CTLA-4. Puis nous avons pu montrer que ces cellules possèdent des propriétés suppressives dans un test d’inhibition de la prolifération de lymphocytes T activés allogéniquement. Les lymphocytes CD8+CD25+ nTregs expriment les gènes FOXP3, CTLA-4, GARP et CCL-4 et les cytokines IL-10 et TGF-β. Par contre, les gènes CD28, ICOS, FOXO1 et Helios sont sous-exprimés dans les nTregs CD8+CD25+ par rapport aux lymphocytes T CD8+CD25-.
Nous avons établi une signature micro-ARN qui comprend 10 micro-ARNs différentiellement exprimés :7 micro-ARNs sous-exprimés "miR-9, -24, -31, -155, -210, -335 et -449 " et 3 micro-ARNs surexprimés " miR-214, -205 et -509". De plus, nous avons pu explorer la relevance biologique de cette signature micro-ARN en montrant dans un premier temps que les miRs "-31, -24, -210, -335" ciblent spécifiquement la région 3'UTR de FOXP3, de même les miR-9 et miR-155 ciblent la région 3'UTR de CTLA-4, et les miR-24, et -335 ciblent la région 3'UTR de GARP. Ceci a été fait par des expériences de co-transfections suivies d'une mesure de l'activité rapportrice luciférase. De plus, nous avons pu démontrer par des expériences de transduction lentivirale ex vivo, de cellules T primaires, que des micro-ARNs de la signature régulent l’expression de FOXP3, CTLA-4 et GARP dans les Tregs naturels CD8+CD25+ humains.
Cette étude montre l'importance des micro-ARNs dans la régulation post-transcriptionnelle des gènes impliqués dans la fonction régulatrice des lymphocytes T régulateurs.
Doctorat en Sciences
info:eu-repo/semantics/nonPublished
Aitken, Sarah Jane. "The pathological and genomic impact of CTCF depletion in mammalian model systems." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/284403.
Full textSousa, Rodrigo Guarischi Mattos Amaral de. "O transcritoma da retinopatia induzida por oxigênio e uma assinatura gênica prognóstica baseada em angiogênese para predição de recidiva de cancer de mama." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/95/95131/tde-28092017-112917/.
Full textAngiogenesis is the process of formation of new blood vessels based on existing vessels. It is a vital process but many diseases also rely on this mechanism to get nourishment and progress. These so called angiogenesis-dependent diseases include cancers, retinopathies and macular degeneration. Some angiogenesis inhibitors were developed in the past decade, aiming to help the management of such diseases and improve patients quality of life. Most of these compounds work by inhibiting VEGFA/VEGFR2 binding, which is also a key element to the survival of quiescent endothelial cells; this may partly explain unanticipated adverse events observed in some clinical trials. We hypothesize that the improvement of anti-angiogenesis therapies hinges on a better and broader understanding of the process, especially when related to diseases\' progression. Using RNA-seq and a well accepted animal model of angiogenesis, the murine model of Oxygen Induced Retinopathy, we have explored the transcriptome landscape and identified 153 genes differentially expressed in angiogenesis. An extensive validation of several genes carried out by qRT-PCR and in-situ hybridization confirmed Esm1 overexpression in endothelial cells of tissues with active angiogenesis, providing confidence on the results obtained. Enrichment analysis of this gene list endorsed a narrow link of angiogenesis and frequently mutated genes in tumours, consistent with the known connection between cancer and angiogenesis, and provided suggestions of already approved drugs that may be repurposed to control angiogenesis under pathological circumstances. Finally, based on this comprehensive landscape of angiogenesis, we were able to create a prognostic molecular biomarker for prediction of breast cancer relapse, with promising clinical applications. In summary, this work successfully unveiled angiogenesis-related genes, providing novel therapeutic alternatives, including potential drugs for repositioning. The set of differentially expressed genes is also a valuable resource for further investigations.
Yang, Tianyu. "Two novel mechanisms of MHC class I down-regulation in human cancer accelerated degradation of TAP-1 mRNA and disruption of TAP-1 protein function /." Connect to this title online, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1078192113.
Full textTitle from first page of PDF file. Document formatted into pages; contains x, 117 p.; also includes graphics (some col.) Includes bibliographical references (p. 99-117). Available online via OhioLINK's ETD Center
Bost, Pierre. "Decoding cellular communications and interactions between immune cells by using single-cell approaches." Electronic Thesis or Diss., Sorbonne université, 2020. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2020SORUS020.pdf.
Full textCellular communications are essential to the proper functioning of multi-cellular organisms, particularly in order to adapt to a constantly changing environment. The cells of the immune system are no exception to this rule, but the interactions between immune cells remain little known and complicated to study. The recent emergence of 'single cell' sequencing technologies represents a unique opportunity to study these communications. In this thesis, different experimental and analytical approaches have been developed to study these communications on a single cell scale. These strategies were then applied to different disease contexts, including COVID-19, Alzheimer's disease or immunisation with inactivated pathogens, and identified previously unknown or poorly understood cellular communication pathways. However, the effectiveness of these approaches is limited by the lack of information on cell location and further work integrating such data will be essential to go further in the dissection of immune cell communications
Hrazdilová, Ivana. "Analýza dat ze sekvenování příští generace ke studiu aktivity transposonů v nádorových buňkách." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220061.
Full textOutlioua, Ahmed. "Exploration des cytokines pro-inflammatoires et de l’inflammasome NLRP3 dans les infections intracellulaires : cas de H. pylori et des virus à ARN Gastric IL-1β, IL-8, and IL-17A expression in Moroccan patients infected with Helicobacter pylori may be a predictive signature of severe pathological stages RNA viruses promote activation of the NLRP3 inflammasome through cytopathogenic effect-induced potassium efflux The heme-regulated inhibitor is a cytosolic sensor of protein misfolding that controls innate immune signaling The Role of Optineurin in Antiviral Type I Interferon Production Possible introduction of Leishmania tropica to urban areas determined by epidemiological and clinical profiles of patients with cutaneous leishmaniasis in Casablanca (Morocco)." Thesis, université Paris-Saclay, 2021. http://www.theses.fr/2021UPASL029.
Full textHelicobacter pylori (H. pylori) is a bacteria that infects the stomach and induces inflammatory gastritis, which can be chronic and progress to gastric cancer. The severity of the infection and its clinical course are associated with various factors including the immune status of the host. The initial inflammatory response to H. pylori infection results in the secretion of a wide range of cytokines, including interleukin-1β (IL-1β), IL-8 and IL-17A. which appear to play a key role in the initiation and progression of gastric cancer. Among these cytokines, IL-1β is a key cytokine during H. pylori infection whose expression is associated with gastric inflammation and carcinogenesis. The production of this cytokine depends on the activation of the inflammasome, in particular the NLRP3 inflammasome. The latter, responsible of the activation of inflammatory processes, is essential for the maintenance of homeostasis against various pathogenic infections such as bacterial and viral infections.The general objective of this work is i) to study the expression and polymorphism of genes for cytokines such as IL-1β, IL-17 and IL-8 in Moroccan patients infected with H. pylori. ii) explore the activation of the NLRP3 inflammasome by H. pylori and determine the mechanisms involved in the activation of this complex by RNA viruses; known as defined activators of NLRP3.Our results underlined a high prevalence of H. pylori and demonstrated a cytokine signature: it can predict metaplasia during the progression of H. pylori infection involving a decrease in IL17A expression in the antrum and increased expression of IL-1β in the fundus. In particular, the genetic polymorphisms of IL-1β (IL-1β -31 and -511) do not appear to influence IL-1β expression significantly.In view of the difficulties encountered in isolating and culturing H. pylori, we used LPS from H. pylori to stimulate the inflammasome. Our results show that the transfection of cells in vitro with bacterial LPS induces the production of IL-1β which appears to be modulated by caspase 4, NOD1 and NOD2. Furthermore, while it is clearly established that RNA viruses induce activation of the NLRP3 inflammasome, the mechanisms by which these viruses induce IL-1β production are not well understood and remain to be confirmed. The results of this part of the work showed that the replication of cytopathogenic RNA viruses such as vesicular stomatitis virus (VSV) or encephalomyocarditis virus (EMCV) induces lytic cell death leading to an efflux of potassium which triggers activation of the NLRP3 inflammasome. Thus, viruses with a high replication capacity and which have a cytopathic effect are capable of inducing the activation of caspase-1 leading to the production of IL-1β. Conversely, viruses which induce type I IFN response are very poor inducers of the NLRP3 inflammasome.A better understanding of the activation of the inflammasome could help in the development of targeted therapeutic strategies for use in the fight against bacterial and viral infections.Key words: Helicobacter pylori, inflammation, NLRP3 inflammasome, IL-1β, RNA virus
Lu, Hsin-Hsien, and 呂信憲. "A Conic RSA Based Convertible Undeniable Signature." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/63666281425599640300.
Full text逢甲大學
通訊工程所
100
The design of an efficient and secure cryptosystem on a conic curve has been the subject of intensive research in recent years. Compare with elliptic curve cryptosystems, encoding/decoding as well as encryption/decryption with the Conic curve cryptosystem is much easier, simpler and faster. Digital signature is the most important service that contemporary cryptography provides. Undeniable Signature, which is very useful in many commercial or personal sensitive signature applications, is a special type of zero-knowledge proof signatures that require the cooperation of the signer to verify the signature validity. However, it is almost unlikely for a cheating signer, even computationally unbounded, to convince V to accept an invalid signature or reject a valid signature. A convertible undeniable signature scheme is an extension of undeniable signature schemes that can be converted to a general signature (or a self-authenticating signature) when the signer discloses certain parameters. Since RSA cryptosystem is currently the most popular and widely used public-key cryptosystem, in this thesis we devote ourselves to designing an RSA based convertible undeniable signature scheme on the conic curve over the integer residue ring Zn . Further, we show that the problem of forging our proposed signature is equivalent to the problem of solving the conic-based RSA problem that is believed to be a computationally infeasible problem.
Huang, Xiao-Wei, and 黃曉偉. "An RSA-based (t, l) Threshold Proxy Signature." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/89591276325242220711.
Full text國立臺灣海洋大學
資訊工程學系
95
In this thesis we propose and analyze a new RSA-based proxy signature scheme and its corresponding (t, ) threshold scheme. Unlike numerous previous research works, the threshold proxy scheme does not require any trusted combiner and is thus a truly practical approach. The security of both schemes is based on the RSA assumption. Both schemes are existentially unforgeable against no message attack in the random oracle model and especially the threshold proxy scheme inherits the merit of its predecessor - Shoup’s RSA threshold scheme - and thus is secure under a multi-party computation setup with active adversaries.
Feng, Y. M., and 馮怡明. "Extended RSA Based Generalized Group-Oriented Cryptosystem and Signature System." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/21061319068786730212.
Full text逢甲大學
電機工程學系
87
It has been pointed out in some previously works that, due to some inherent limitations on the used modulus, the RSA cryptosystem is hard to be incorporated in the design of cryptosystems or signature systems in a group-oriented communication environment. In this thesis, we first propose a cryptosystem, called the ERSA (Extended RSA) cryptosystem, which is a natural extension of the well-known RSA cryptosystem. It is pointed out that although the security of the ERSA cryptosystem is the same as that of the original RSA system; however, in the ERSA cryptosystem, vectors of integers instead of integers are used as the encryption/decryption keys so that it is more adapted for the design of cryptosystems and signature systems in a group oriented communication environment. Accordingly, based upon the encryption/ decryption technique of the ERSA system and Diffie-Hellman’s key distribution technique, we present a generalized group oriented cryptosystem. In the presented system, the sender is allowed to determine the encryption/ decryption keys and specify a set of combinations of legal recipients (called an access structure) without any coordination with the receiving group. And he may broadcast the encrypted message to the group in such a way that, without the need of any trusted clerks or centers, the ciphertext is decipherable when and only when all authorized recipients of a combination in the access structure (called an access instance) work together. The modulus used for computing shadow key of each recipient is universal and the system’s security is based on the computational infeasibility of both the discrete logarithm problem and the factorization problem. In addition, the presented system has the capabilities of cheater detection and fake shadow correction. Further, based upon the signature technique of the ERSA system, we propose a generalized group signature system. In the proposed system, the clerk of the group can specify, according to the classified grade of the message and the group signature policy, a set of combinations of authorized signers (called a signature structure) such that when and only when all authorized signers of a combination in the signature structure (called a signature instance) work together can sign a message on behalf of the group. The modulus used for each individual signature as well as the group signature is universal and the security of the proposed system is guaranteed by the computational infeasibility of the factorization problem.
Kao, Chih-Chung, and 高志中. "Using DR-Signature and Randomized RSA-Based Partially Blind Signature to Design a Digital Content Payment Scheme for Multiple Payees." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/xvr93u.
Full text國立中央大學
資訊管理研究所
94
As the broadband internet is popularized and the output value of digital content continues increasing, the market of online transaction is expected to grow dramatically in the future. How to assure rights and interests of participants don’t be damaged when they make online transaction? The dependable online payment scheme is the critical factor. Meanwhile, under the knowledge-intensive era, a digital content can be created by several individuals who have interrelated knowledge. The selling revenue of the digital content should be correctly assigned to each payee (authors and merchants) in real time, so that creators may have stronger motivation to create more digital content. Base on the above-mentioned, the purpose of this paper is to design an online payment scheme which has three features, include (1) assuring the payment security and transaction privacy, (2) preventing frauds from being made, and (3) supporting multiple payees payment. In this paper, we combine the concepts of randomized RSA partially blind signature, DR-signature (a kind of convertible signature), and multi-signature, to propose a four phase online payment scheme, include (1) initializing phase, (2) withdrawing phase, (3) purchasing phase, and (4) requesting phase. In the initializing phase, all members (customers, merchants, and authors) register to the third trust party (TTP), bank needs to generate RSA-based private/public keys, and all payees belong to one digital content should make a multi-signature of a proportion of apportionment (PROPp_id). Customers, merchants, bank, and TTP complete an online transaction in withdrawing phase and purchasing phase. If someone finds his rights is damaged, he can request TTP to arbitrate to safeguard himself in the requesting phase. Base on cryptographic skill and design of transaction process, our proposed payment scheme can assure payment security and transaction privacy, prevent frauds, and support multilateral payment.
Guan, Chi-Hao, and 管紀豪. "A EUF-CMA RSA Signature Scheme based on Phi-Hiding Assumption and Trapdoor Hash Function in the Standard Model." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/67708044707947857243.
Full text國立臺灣海洋大學
資訊工程學系
99
We propose an EUF-CMA signature scheme based on Φ-hiding assumption [13] in the standard model. At the mean time, we found the RSA cryptosystem has lossy property [35]. This discovery also found by Kiltz et al [27]. On the orher side, Shamir and Tauman has proposed OnLine/OffLine signature scheme [39]: When OffLine phase, decide the trapdoor hash value until OnLine phase compute the correspond preimage by trapdoor key. Using this primitive, many EUF-CMA signature scheme has been proposed such as [5]、[9]、[10]、[11]、[12]、[17]、[23]、[26]、[29]、[32]、[33]、[41]. We using the two general ideas and try to prove the security of RSA cryptosystem satisfy the EUF-CMA property in the standard model.
Chen, Cheng-huan, and 陳震寰. "New Blind Signatures Based on RSA and ElGamal Signatures." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/92108922873986986857.
Full text中原大學
電機工程研究所
90
Abstract This thesis proposes three new blind signature schemes. The first two schemes are based on RSA signature, and the third is on ElGamal signature. The first scheme is proposed by means of the decomposition of messages. After decomposing the messages, the verifier sends parts of the decomposed messages to the signer. The singer signs the corresponding messages by his private key, and finally the verifier integrates the signed messages to obtain the desired signature. The second scheme is based on the algebraic operation of exponent on messages. Two blind messages are generated, then the verifier sends them to the signer. The desired signature can be computed after the signatures with blind factor were received. Both of the two blind signature schemes have the feature of smaller size of data, and we believe that it will lead to less computational complexity without reduction of security. In the third scheme, we propose a modification of ElGamal signature. By using a simple way of signing, we find a new blind signature based on the modified ElGamal signature. The process of the blind modified ElGamal signature is very simple that it reduces the computational complexity. The main results of our study are as follows. (1) We propose two new blind signatures based on RSA. The feature of our new schemes is that the data length in our algorithms is smaller than the existent RSA blind signature. (2) We also propose a new blind signature based on a modification of ElGamal signature. It is an important feature that our new scheme is much simpler than the other existent blind ElGamal signatures. All of the three blind schemes have the advantage of less computational complexity. It is believed that the results of our study in this thesis will be helpful to further research in the area of digital signature.
Dias, Miguel Ângelo Simão. "Uncovering the regulatory T cell transcriptional signature in the human thymus." Master's thesis, 2018. http://hdl.handle.net/10316/86264.
Full textOs linfócitos T reguladores (Tregs) desempenham um papel crucial na manutenção da homeostasia imunológica, impedindo ou limitando respostas imunes. As Tregs são particularmente eficazes a suprimir as células T convencionais (Tconvs), e desta forma limitam a imunopatologia associada à imunidade contra patogéneos e células cancerígenas, bem como os processos alérgicos, autoimunes e inflamatórios. Uma população significativa de Tregs é gerada durante o desenvolvimento das células T no timo conhecidas como Tregs naturais (ou derivadas do timo), sendo definidas pela presença da proteína FOXP3. Este fator de transcrição desempenha um papel crucial na diferenciação destas células, não só através da repressão de genes normalmente expressos em Tconvs, mas também promovendo a ativação de genes específicos de Tregs, incluindo IL2RA (CD25) e CTLA4. No entanto, vários estudos demostraram que a diferenciação e comprometimento destas células pode ser independente de FOXP3, indicando a existência de outros fatores, atualmente desconhecidos, os quais são suficientes para promover o desenvolvimento das Tregs. Neste estudo, investiguei a diferenciação e o comprometimento das células Treg no timo humano, a fim de identificar novos fatores potencialmente envolvidos nesta decisão. Para isso, isolámos Tregs e Tconvs tímicas maduras CD4 positivas com base na expressão dos marcadores CD27, CD25 e CD127, a partir de tecido tímico humano removido durante cirurgias cardíacas pediátricas corretivas de três indivíduos, e geramos os seus respetivos perfis de expressão génica através da sequenciação do RNA (RNA-seq).A nossa análise da comparação da transcrição identificou 1047 genes significativamente e diferencialmente expressos entre tTregs e tTconvs, dos quais 648 com sobre expressão em tTregs. Destes 648 genes, observei a expressão proeminente de alguns genes associados a este tipo celular, incluindo FOXP3, IL2Rα (CD25), CTLA4, TNFRSF4 (OX40), TNFRSF18 (GITR), IKZF2 (HELIOS) e IKZF4 (EOS). Para alem disso, identifiquei um conjunto de 196 genes unicamente expressos em tTreg em comparação com tTconv, alguns dos quais codificam proteínas com conhecida relevância na biologia destas células, incluindo TNFRSF8 (CD30), LRRC32 (GARP) e CCR8, bem como genes cuja função em tTregs é desconhecida, nomeadamente DNAH8 e TNFRSF11A. Enquanto a expressão de DNAH8 pode ser indicativa da formação de sinapses imunológicas, a expressão de TNFRSF11A pode sugerir um mecanismo adicional de supressão através dos quais as tTregs previnem a ativação das tTconvs.Dos genes encontrados sobre expressos nas tTregs em comparação com as tTconvs, 46 codificam fatores de transcrição. Estes incluem alguns já conhecidos como estando diretamente envolvidos na diferenciação destas células, como FOXP3, IKZF2, IKZF4, FOXO1 e NR4A3, bem como fatores de transcrição envolvidos na ativação e diferenciação de Tconvs, como o TBX21, IRF4, STAT4, BATF e RORA. Além disso, identifiquei também membros da via de sinalização NF-kB (REL, RELB e NFKB2), indicando o seu estado ativo durante a diferenciação destas células. Por fim, encontrei um grupo de fatores de transcrição sobre expressos em Tregs e sem funções previamente descritas nestas células, nomeadamente IRF5, ZBTB38, KLF6 e CREB3L2, o que sugere a presença de novas vias de regulação da transcrição envolvidas nos processos de diferenciação e função das células T reguladorasEm conclusão, esta tese apresenta o primeiro perfil de transcrição de Tregs e Tconvs de timo humano, cujas análises serão fundamentais para a compreensão do seu desenvolvimento. Até à data, estes dados permitiram a identificação de novos genes com funções desconhecidas nestes grupos celulares, o que poderá representar fatores adicionais envolvidos na definição das células T no timo. No futuro, estes dados permitirão explorar novas linhas de investigação com o objetivo de esclarecer o desenvolvimento da linhagem Treg no timo humano, bem como ajudar na definição da assinatura de expressão destas células.
Regulatory T cells (Tregs) are key players in maintaining immune homeostasis, by preventing or limiting immune responses. They are particularly efficient in suppressing conventional T cells (Tconvs), and in this way control the immunopathology associated with immunity against pathogens and cancer as well as preventing allergy, autoimmune diseases, and chronic inflammation. An important Treg subset is generated during T cell development in the thymus, known as thymic-derived Treg. It is best defined by the expression of the forkhead box protein FOXP3, a transcription factor that plays a crucial role in Treg cell differentiation by repressing the expression of genes otherwise upregulated in Tconv cells, as well as by promoting to the activation of Treg specific genes, including IL2Rα (CD25) and CTLA4. However, recent studies have shown that Treg commitment may occur independently of FOXP3, indicating that other factors, presently unknown, are sufficient for the generation of Tregs. Here I have investigated the differentiation and commitment of Treg cells in the human thymus, in order to identify novel factors potentially involved in this decision. To do this, we FACS sorted mature CD4 single-positive thymic Tregs (tTregs) and their conventional counterparts (tTconvs) based on the expression of CD27, CD25, and CD127 markers, from three human thymuses collected during pediatric corrective cardiac surgery, and generated their respective genome-wide expression profiles by RNA-seq. We ensure that these thymuses have an immunophenotype representative of all stages of T cell development and consistent with the one described in the literature.Our comparative transcriptomic analysis identified 1047 genes significantly differentially expressed between tTreg and tTconv subsets, with 648 of these up-regulated in tTregs. Amongst these, I observed the prominent expression of Treg-associated genes, including FOXP3, the IL2Rα (CD25), CTLA4, TNFRSF4 (OX40), TNFRSF18 (GITR), IKZF2 (HELIOS) and IKZF4 (EOS). From these, I identified a set of 196 genes that are uniquely expressed in tTreg compared to tTconv, encoding proteins with relevance to Treg biology, such as TNFRSF8, LRRC32, and CCR8, as well as others with no previously reported activity in tTreg cells, as DNAH8 and TNFRSF11A. Whilst DNAH8 expression may be indicative of the formation of immunological synapses, the expression of TNFRSF11A may indicate an additional suppression mechanism by which Tregs prevents Tconv cell activation. From the genes found to be up-regulated in tTreg cells compared to tTconvs, 46 were transcription factors. These include some known to be directly involved in Treg development, such as FOXP3, IKZF2, IKZF4, FOXO1, and NR4A3, as well as transcription factors involved in Tconv cell activation and differentiation, such as TBX21, IRF4, STAT4, BATF and RORA. In addition, several members of the NF-kB pathway (REL, RELB, NFKB2) are also up-regulated in tTregs, indicating the activated state of this pathway during tTreg differentiation. Importantly, a set of transcription factors with no previous reported role in human regulatory T cells, IRF5, ZBTB38, KLF6, and CREB3L2, are overexpressed in tTregs, suggesting additional layers of transcriptional regulation of Treg cell differentiation and function. Altogether, this thesis presents the first transcriptomic profile of the human thymic Treg and Tconv subsets, which analyses are absolutely necessary to the understanding of their development. So far, they allowed the identification of novel genes with unreported functions in these subsets, which might represent additional factors involved in the definition of thymic T cells; in the near future, these data will open several new lines of research aiming to clarify the pathways of Treg lineage commitment in the human thymus and will help in the definition of the expression signature of human tTreg subset.
Outro - This work is supported by grants PAC-PRECISE-LISBOA-01-0145-FEDER-016394 and LISBOA-01-0145-FEDER-007391 cofunded by FEDER through POR Lisboa 2020 - Programa Operacional Regional de Lisboa PORTUGAL 2020 and Fundação para a Ciência e a Tecnologia (FCT); and by funds from the European Union's Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No.: 675395.
Schwans, Jason Patrick. "Using nucleotide analogues to define chemical signatures within folded RNA molecules /." 2003. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3108110.
Full textTrofimov, Assya. "Étude des signatures géniques dans un contexte d’expériences de RNA- Seq." Thèse, 2017. http://hdl.handle.net/1866/20417.
Full textChen, Feng-Mei, and 陳鳳美. "A Study of Security on Computer Auditing Task-Based on Dual Complexities Using RSA and ElGamal Signatures." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/57702972827945168057.
Full text國防大學國防管理學院
國防資訊研究所
97
Due to the vigorous development of infornations technology, the function of computer soft and hardware advances day by day. The computer popularrate of governmental agency and school continues to grow fast. Detailed information is established mostly in the computer hard disk, magnetic tape or in the electromagnetism storage memory, causes the audit trail to reduce even predicament of gradually the evanishment. Auditors all levels of institution organization faced with strike unprecedentedly with challenge. The risks of auditing enhance largely. Facing the computerization tendency, employ the good computer auxiliary auditing technique is inevitable. This research is for the purpose of discussing in the audit work process to produce the system regarding the auditors all report formas, RSA and ElGamal of complexity visa way by the foctor, joins personnel’s status authentication to eradicate corrupt practices. And strengthens the electron financial reporting result potency in order to enhance enterprise internal control, so as to the enhancerment audit sevice quality, reduces the audit risk. Enables the advantage acceleration follow-up audit report circulation, moreover, to enter the step to become relizings the continuous computer audit footstone.
Labadorf, Adam. "Characterizing the Huntington's disease, Parkinson's disease, and pan-neurodegenerative gene expression signature with RNA sequencing." Thesis, 2016. https://hdl.handle.net/2144/17865.
Full textMattison, Stacey A., G. L. Blatch, and Adrienne Lesley Edkins. "HOP expression is regulated by p53 and RAS and characteristic of a cancer gene signature." 2018. http://hdl.handle.net/10962/66278.
Full textThe Hsp70/Hsp90 organising protein (HOP) is a co-chaperone essential for client protein transfer from Hsp70 to Hsp90 within the Hsp90 chaperone machine. Although HOP is upregulated in various cancers, there is limited information from in vitro studies on how HOP expression is regulated in cancer. The main objective of this study was to identify the HOP promoter and investigate its activity in cancerous cells. Bioinformatic analysis of the -2500 to +16 bp region of the HOP gene identified a large CpG island and a range of putative cis-elements. Many of the cis-elements were potentially bound by transcription factors which are activated by oncogenic pathways. Luciferase reporter assays demonstrated that the upstream region of the HOP gene contains an active promoter in vitro. Truncation of this region suggested that the core HOP promoter region was -855 to +16 bp. HOP promoter activity was highest in Hs578T, HEK293T and SV40- transformed MEF1 cell lines which expressed mutant or inactive p53. In a mutant p53 background, expression of wild-type p53 led to a reduction in promoter activity, while inhibition of wild-type p53 in HeLa cells increased HOP promoter activity. Additionally, in Hs578T and HEK293T cell lines containing inactive p53, expression of HRAS increased HOP promoter activity. However, HRAS activation of the HOP promoter was inhibited by p53 overexpression. These findings suggest for the first time that HOP expression in cancer may be regulated by both RAS activation and p53 inhibition. Taken together, these data suggest that HOP may be part of the cancer gene signature induced by a combination of mutant p53 and mutated RAS that is associated with cellular transformation.
Robitaille, Julie. "Étude de la signature dynamique de transcrits primaires impliquée dans la maturation des microARN." Thèse, 2016. http://hdl.handle.net/1866/18669.
Full textMicroRNAs (miRNAs) are small non-coding RNAs, which can inhibit target messenger RNAs translation. In order to obtain a miRNA, two enzymes, Drosha and Dicer cut the gene of miRNA. The RNA interacts with the proteins by its general hairpin structure. However, the details of the structure are still missing. The objective of this project is to establish if there is a relation between the efficiency of maturation and the RNA’s structural dynamics. In order to do this, the maturation efficiency of miRNA variants is measured by Northern Blot. The structural dynamics is measured by a program assessing the information of the sequence. The correlation between the dynamics and the maturation efficiency of the miRNA is 0.74 with a p-value of 0.02206. This correlation is superior to those based on free energy, which does not reach 0.6. The tested mutants of miR128-1 and miR188 have inhibited maturation; also, those of miR125a, miR188 and miR330 have modified the cleavage site of Drosha. A better knowledge of the dynamic structure involved in maturation would help define the impact of miRNA mutation or to predict sequences that are able to generate miRNAs.
Hušková, Hana. "Výzkum klíčových mechanizmů onkogeneze s použitím modelových buněčných systémů." Doctoral thesis, 2017. http://www.nusl.cz/ntk/nusl-372371.
Full textDallaire, Paul. "Une signature du polymorphisme structural d’acides ribonucléiques non-codants permettant de comparer leurs niveaux d’activités biochimiques." Thèse, 2014. http://hdl.handle.net/1866/12336.
Full textRecent experimental evidence indicates that RNA structure changes, sometimes very rapidly and that these changes are both required for biochemical activity and captured by the secondary structure prediction software MC-Fold. RNA structure is thus dynamic. We compared RNA sequences from the point of view of their structural dynamics so as to investigate how similar their biochemical activities were by computing a signature from the output of the structure prediction software MC-Fold. This required us to accelerate considerably the software MC-Fold. The algorithmic approach to this acceleration is described in chapter 1. In chapter 2, point mutations that disrupt the biochemical activity of microRNA are explained in terms of changes in RNA dynamics. Finally, in chapter 3 we identify dynamic structure windows in long RNA with potentially significant roles in autism spectrum disorders and separately in Xenopus ssp. (species of frogs) egg polarisation.