Wet-Spun Trojan Horse Cell Constructs for Engineering Muscle
暂无分享,去创建一个
G. Wallace | J. Foroughi | J. Razal | R. Kapsa | A. Quigley | S. Moulton | J. Crook | R. Cornock | T. Mysore | M. Kita
[1] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[2] James H. Burrows,et al. Secure Hash Standard , 1995 .
[3] Wee,et al. Protein release from alginate matrices. , 1998, Advanced drug delivery reviews.
[4] R. Kapsa,et al. Leukemia inhibitory factor ameliorates muscle fiber degeneration in the mdx mouse , 2000, Muscle & nerve.
[5] R. Kapsa,et al. In vivo and in vitro correction of the mdx dystrophin gene nonsense mutation by short-fragment homologous replacement. , 2001, Human gene therapy.
[6] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[7] Andrew P. Weir,et al. Function and genetics of dystrophin and dystrophin-related proteins in muscle. , 2002, Physiological reviews.
[8] A. Emery,et al. The muscular dystrophies , 2002, The Lancet.
[9] Sheila Frankel,et al. The AES-CBC Cipher Algorithm and Its Use with IPsec , 2003, RFC.
[10] R. Kapsa,et al. For Personal Use. Only Reproduce with Permission from the Lancet Publishing Group. Molecular Pathology of Dmd Novel Therapies for Dmd Novel Therapies for Duchenne Muscular Dystrophy , 2022 .
[11] Yimin Qin. A comparison of alginate and chitosan fibres. , 2004, Medical device technology.
[12] David Pointcheval,et al. Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.
[13] J. Bouchard,et al. Dystrophin expression in myofibers of Duchenne muscular dystrophy patients following intramuscular injections of normal myogenic cells. , 2004, Molecular therapy : the journal of the American Society of Gene Therapy.
[14] David von Oheimb. The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA , 2005 .
[15] R. Kapsa,et al. DNA electroporation in vivo targets mature fibres in dystrophic mdx muscle , 2005, Neuromuscular Disorders.
[16] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[17] J. Bouchard,et al. Dystrophin Expression in Muscles of Duchenne Muscular Dystrophy Patients After High-Density Injections of Normal Myogenic Cells , 2006, Journal of neuropathology and experimental neurology.
[18] D. Mooney,et al. Regulating activation of transplanted cells controls tissue regeneration. , 2006, Proceedings of the National Academy of Sciences of the United States of America.
[19] K. Takeda,et al. A Product Based Security Model for Smart Home Appliances , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[20] David J Mooney,et al. Alginate hydrogels as biomaterials. , 2006, Macromolecular bioscience.
[21] Kim-Kwang Raymond Choo. Key establishment : proofs and refutations , 2006 .
[22] S. Picken,et al. Orientational order and mechanical properties of poly(amide-block-aramid) alternating block copolymer films and fibers , 2006 .
[23] M. Cook,et al. Effective detection of corrected dystrophin loci in mdx mouse myogenic precursors , 2007, Human mutation.
[24] Yi Hong,et al. Covalently crosslinked chitosan hydrogel: properties of in vitro degradation and chondrocyte encapsulation. , 2007, Acta biomaterialia.
[25] Elisa Bertino,et al. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting , 2008, IEEE Transactions on Dependable and Secure Computing.
[26] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[27] Yimin Qin,et al. Alginate fibres: an overview of the production processes and applications in wound management , 2008 .
[28] Jongpil Jeong,et al. Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[29] Joselito M. Razal,et al. Wet‐Spun Biodegradable Fibers on Conducting Platforms: Novel Architectures for Muscle Regeneration , 2009 .
[30] V Mironov,et al. Biofabrication: a 21st century manufacturing paradigm , 2009, Biofabrication.
[31] C. Chiu,et al. Fabrication of Porous Gelatin Microfibers Using an Aqueous Wet Spinning Process , 2009, Artificial cells, blood substitutes, and immobilization biotechnology.
[32] Athina Lazakidou. Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications , 2010 .
[33] J. Mendell,et al. Dystrophin immunity in Duchenne's muscular dystrophy. , 2010, The New England journal of medicine.
[34] Palash Sarkar,et al. A Simple and Generic Construction of Authenticated Encryption with Associated Data , 2010, TSEC.
[35] Carles Gomez,et al. Wireless home automation networks: A survey of architectures and technologies , 2010, IEEE Communications Magazine.
[36] Dimitrios Makrakis,et al. Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).
[37] Hyun Jung Kim,et al. AUTHHOTP - HOTP Based Authentication Scheme over Home Network Environment , 2011, ICCSA.
[38] K. Draget,et al. Chemical, physical and biological properties of alginates and their biomedical implications , 2011 .
[39] Kefei Chen,et al. An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System , 2012, Journal of Medical Systems.
[40] H. Vandenburgh,et al. The role of multifunctional delivery scaffold in the ability of cultured myoblasts to promote muscle regeneration. , 2011, Biomaterials.
[41] Sang-Hoon Lee,et al. Microfluidic wet spinning of chitosan-alginate microfibers and encapsulation of HepG2 cells in fibers. , 2011, Biomicrofluidics.
[42] Jong Hyuk Park,et al. Robust one-time password authentication scheme using smart card for home network environment , 2011, Comput. Commun..
[43] Sanjay Singh,et al. Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication , 2012, 2012 International Conference on Innovations in Information Technology (IIT).
[44] G. Wallace,et al. Organic Bionics: WALLACE:ORGANIC BIONICS O-BK , 2012 .
[45] Daniel Mossé,et al. Seamless Integration of Heterogeneous Devices and Access Control in Smart Homes , 2012, 2012 Eighth International Conference on Intelligent Environments.
[46] Taeshik Shon,et al. A novel secure key paring protocol for RF4CE ubiquitous smart home systems , 2012, Personal and Ubiquitous Computing.
[47] D. Mooney,et al. Alginate: properties and biomedical applications. , 2012, Progress in polymer science.
[48] Juin-Yih Lai,et al. Evolution of polymeric hollow fibers as sustainable technologies: Past, present, and future , 2012 .
[49] Cheng-Chi Lee,et al. Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices , 2013, IET Comput. Digit. Tech..
[50] Yue Li,et al. Design of a Key Establishment Protocol for Smart Home Energy Management System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.
[51] G. Wallace,et al. In vitro growth and differentiation of primary myoblasts on thiophene based conducting polymers. , 2013, Biomaterials science.
[52] Johnson H. Y. Chung,et al. Bio-ink properties and printability for extrusion printing living cells. , 2013, Biomaterials science.
[53] J. Huard,et al. Development of Biological Approaches to Improve Muscle Healing After Injury and Disease , 2013 .
[54] M. Falzarano,et al. Biodistribution and Molecular Studies on Orally Administered Nanoparticle-AON Complexes Encapsulated with Alginate Aiming at Inducing Dystrophin Rescue in mdx Mice , 2013, BioMed research international.
[55] G. Wallace,et al. Engineering a multimodal nerve conduit for repair of injured peripheral nerve , 2013, Journal of neural engineering.
[56] Li Xu,et al. Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.
[57] Robert Simon Sherratt,et al. Enhanced three-factor security protocol for consumer USB mass storage devices , 2014, IEEE Transactions on Consumer Electronics.
[58] Vanga Odelu,et al. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.
[59] Freddy K. Santoso,et al. Securing IoT for smart home system , 2015, 2015 International Symposium on Consumer Electronics (ISCE).
[60] Ashok Kumar Das,et al. A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems , 2015, Journal of Medical Systems.
[61] Yasir Saleem,et al. Network Simulator NS-2 , 2015 .
[62] David Thaler,et al. Architectural Considerations in Smart Object Networking , 2015, RFC.
[63] Andrei Gurtov,et al. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.
[64] Chin-Chen Chang,et al. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.
[65] Xiong Li,et al. Provably secure user authentication and key agreement scheme for wireless sensor networks , 2016, Secur. Commun. Networks.
[66] Ashok Kumar Das,et al. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..
[67] Vanga Odelu,et al. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms , 2016, IEEE Transactions on Consumer Electronics.
[68] R. David Hawkins,et al. Muscle-specific CRISPR/Cas9 dystrophin gene editing ameliorates pathophysiology in a mouse model for Duchenne muscular dystrophy , 2017, Nature Communications.
[69] Ashok Kumar Das,et al. A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..
[70] Athanasios V. Vasilakos,et al. Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment , 2018, IEEE Transactions on Dependable and Secure Computing.
[71] By Ciarán Morrison. What is a ‘ Smart Home ’ ? , 2019 .