scispace - formally typeset
Search or ask a question
Institution

Brown University

EducationProvidence, Rhode Island, United States
About: Brown University is a education organization based out in Providence, Rhode Island, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 35778 authors who have published 90896 publications receiving 4471489 citations. The organization is also known as: brown.edu & Brown.


Papers
More filters
Journal ArticleDOI
TL;DR: It is shown that mouse interferon-α–producing cells (mIPCs) are a unique subset of immature antigen-presenting cells (APCs) that secrete IFN-α upon stimulation with viruses and interleukin 12 (IL-12) in response to viruses and CpG oligodeoxynucleotides, but not bacterial products.
Abstract: We show here that mouse interferon-alpha (IFN-alpha)-producing cells (mIPCs) are a unique subset of immature antigen-presenting cells (APCs) that secrete IFN-alpha upon stimulation with viruses. mIPCs have a plasmacytoid morphology, can be stained with an antibody to Ly6G and Ly6C (anti-Ly6G/C) and are Ly6C+B220+CD11cloCD4+; unlike other dendritic cell subsets, however, they do not express CD8alpha or CD11b. Although mIPCs undergo apoptosis in vitro, stimulation with viruses, IFN-alpha or CpG oligonucleotides enhanced their survival and T cell stimulatory activity. In vivo, mIPCs were the main producers of IFN-alpha in cytomegalovirus-infected mice, as depletion of Ly6G+/C+ cells abrogated IFN-alpha production. mIPCs produced interleukin 12 (IL-12) in response to viruses and CpG oligodeoxynucleotides, but not bacterial products. Although different pathogens can selectively engage various APC subsets for IL-12 production, IFN-alpha production is restricted to mIPCs' response to viral infection.

1,056 citations

Book
01 Jan 1969

1,054 citations

Book ChapterDOI
15 Aug 2004
TL;DR: This work proposes a new and efficient signature scheme that is provably secure in the plain model and provides efficient protocols that allow one to prove in zero-knowledge the knowledge of a signature on a committed (or encrypted) message and to obtain a signatureon a committed message.
Abstract: We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf (LRSW) who also showed that it holds for generic groups and is independent of the decisional Diffie-Hellman assumption. We prove security of our scheme under the LRSW assumption for groups with bilinear maps. We then show how our scheme can be used to construct efficient anonymous credential systems as well as group signature and identity escrow schemes. To this end, we provide efficient protocols that allow one to prove in zero-knowledge the knowledge of a signature on a committed (or encrypted) message and to obtain a signature on a committed message.

1,051 citations

Journal ArticleDOI
16 Aug 2006-JAMA
TL;DR: The virologic target for patients with treatment failure is now a plasma HIV-1 RNA level below 50 copies/mL, making delivery of state-of-the-art care challenging.
Abstract: Context Guidelines for antiretroviral therapy are important for clinicians worldwide given the complexity of the field and the varied clinical situations in which these agents are used. The International AIDS Society–USA panel has updated its recommendations as warranted by new developments in the field. Objective To provide physicians and other human immunodeficiency virus (HIV) clinicians with current recommendations for the use of antiretroviral therapy in HIVinfected adults in circumstances for which there is relatively unrestricted access to drugs and monitoring tools. The recommendations are centered on 4 key issues: when to start antiretroviral therapy; what to start; when to change; and what to change. Antiretroviral therapy in special circumstances is also described. Data Sources and Study Selection A 16-member noncompensated panel was appointed, based on expertise in HIV research and patient care internationally. Data published or presented at selected scientific conferences from mid 2004 through May 2006 were identified and reviewed by all members of the panel. Data Extraction and Synthesis Data that might change previous guidelines were identified and reviewed. New guidelines were drafted by a writing committee and reviewed by the entire panel. Conclusions Antiretroviral therapy in adults continues to evolve rapidly, making delivery of state-of-the-art care challenging. Initiation of therapy continues to be recommended in all symptomatic persons and in asymptomatic persons after the CD4 cell count falls below 350/µL and before it declines to 200/µL. A nonnucleoside reverse transcriptase inhibitor or a protease inhibitor boosted with low-dose ritonavir each combined with 2 nucleoside (or nucleotide) reverse transcriptase inhibitors is recommended with choice being based on the individual patient profile. Therapy should be changed when toxicity or intolerance mandate it or when treatment failure is documented. The virologic target for patients with treatment failure is now a plasma HIV-1 RNA level below 50 copies/mL. Adherence to antiretroviral therapy in the short-term and the long-term is crucial for treatment success and must be continually reinforced.

1,050 citations

Book ChapterDOI
Melissa Chase1
21 Feb 2007
TL;DR: The question of whether a scheme could be constructed in which multiple authorities were allowed to distribute attributes is answered in the affirmative and how to apply the techniques to achieve a multiauthority version of the large universe fine grained access control ABE is shown.
Abstract: In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single authority attribute encryption scheme and left open the question of whether a scheme could be constructed in which multiple authorities were allowed to distribute attributes [SW05]. We answer this question in the affirmative. Our scheme allows any polynomial number of independent authorities to monitor attributes and distribute secret keys. An encryptor can choose, for each authority, a number dk and a set of attributes; he can then encrypt a message such that a user can only decrypt if he has at least dk of the given attributes from each authority k. Our scheme can tolerate an arbitrary number of corrupt authoritites. We also show how to apply our techniques to achieve a multiauthority version of the large universe fine grained access control ABE presented by Gopal et al. [GPSW06].

1,046 citations


Authors

Showing all 36143 results

NameH-indexPapersCitations
Walter C. Willett3342399413322
Robert Langer2812324326306
Robert M. Califf1961561167961
Eric J. Topol1931373151025
Joan Massagué189408149951
Joseph Biederman1791012117440
Gonçalo R. Abecasis179595230323
James F. Sallis169825144836
Steven N. Blair165879132929
Charles M. Lieber165521132811
J. S. Lange1602083145919
Christopher J. O'Donnell159869126278
Charles M. Perou156573202951
David J. Mooney15669594172
Richard J. Davidson15660291414
Network Information
Related Institutions (5)
Columbia University
224K papers, 12.8M citations

96% related

University of Washington
305.5K papers, 17.7M citations

95% related

Yale University
220.6K papers, 12.8M citations

95% related

Stanford University
320.3K papers, 21.8M citations

95% related

Johns Hopkins University
249.2K papers, 14M citations

95% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023126
2022591
20215,550
20205,321
20194,806
20184,462