Showing results 13 to 25 of 25
< previous
Title | Author(s) | Issue Date | |
---|---|---|---|
Identity-Based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage Journal:IEEE Transactions on Information Forensics and Security | 2017 | ||
Improved security of a dynamic remote data possession checking protocol for cloud storage Journal:Expert Systems with Applications | 2014 | ||
Message from the LSNS 2014 workshop chairs Journal:Proceedings - 2014 IEEE International Conference on Computer and Information Technology, CIT 2014 | 2014 | ||
New insight to preserve online survey accuracy and privacy in big data era Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
Public cloud data auditing with practical key update and zero knowledge privacy Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
Remote data possession checking with enhanced security for cloud storage Journal:Future Generation Computer Systems | 2015 | ||
Robust recovery of subspace structures by low-rank representation Journal:IEEE Transactions on Pattern Analysis and Machine Intelligence | 2013 | ||
Secure delegation of signing power from factorization Journal:Computer Journal | 2015 | ||
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents Journal:Information Processing Letters | 2014 | ||
2013 | |||
2016 | |||
2015 | |||
The transcription factor Bcl11b is specifically expressed in group 2 innate lymphoid cells and is essential for their development Journal:Journal of Experimental Medicine | 2015 |