Library

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISSN: 1432-0428
    Keywords: Keywords Coxsackie B virus ; peptide binding ; HLA-DR ; molecular mimicry ; IDDM.
    Source: Springer Online Journal Archives 1860-2000
    Topics: Medicine
    Notes: Summary It has been proposed that molecular mimicry between protein 2C (p2C) of coxsackie virus B4 and the autoantigen glutamic acid decarboxylase (GAD65) plays a role in the pathogenesis of insulin-dependent diabetes mellitus (IDDM). In this study we show that the amino acid sequence of p2C which shares homology with a sequence in GAD65 (PEVKEK), is highly conserved in coxsackie virus B4 isolates as well as in different viruses of the subgroup of coxsackie B-like enteroviruses. These are the most prevalent enteroviruses and therefore exposure to the mimicry motif will be a frequent event throughout life. Presentation of the homologous peptides by HLA molecules is essential for T-cell reactivity. Therefore, we tested whether the PEVKEK motif can bind to the IDDM-associated HLA-DR1, -DR3 and -DR4 molecules. Synthetic peptides with sequences derived from p2C and GAD65 did bind to HLA-DR3 but not to HLA-DR1 or -DR4. Replacement of amino acids within the motif showed that the PEVKEK motif binds specifically to HLA-DR3. Moreover, both p2C and GAD65 peptides bind in the same position within the peptide binding groove of the DR3 molecule which is an essential requirement for T-cell cross-reactivity. The results support molecular mimicry between p2C of coxsackie B-like enteroviruses and GAD65. However, this molecular mimicry may be limited to the HLA-DR3 positive subpopulation of IDDM patients. [Diabetologia (1998) 41: 40–46]
    Type of Medium: Electronic Resource
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...