Showing results 17 to 25 of 25
< previous
Title | Author(s) | Issue Date | |
---|---|---|---|
Public cloud data auditing with practical key update and zero knowledge privacy Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
Remote data possession checking with enhanced security for cloud storage Journal:Future Generation Computer Systems | 2015 | ||
Robust recovery of subspace structures by low-rank representation Journal:IEEE Transactions on Pattern Analysis and Machine Intelligence | 2013 | ||
Secure delegation of signing power from factorization Journal:Computer Journal | 2015 | ||
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents Journal:Information Processing Letters | 2014 | ||
2013 | |||
2016 | |||
2015 | |||
The transcription factor Bcl11b is specifically expressed in group 2 innate lymphoid cells and is essential for their development Journal:Journal of Experimental Medicine | 2015 |