Post a Project

RedPel

Subtitle

JAVA - SECURE COMPUTING

 
Sort: Recent | Popular Grid List
The Devils Behind Web Application Vulner...
by RedPel on February 18, 2015 at 3:28 AM
598 Views - 0 Comments

Security Architecture for Cloud Networki...
by RedPel on February 18, 2015 at 3:25 AM
597 Views - 0 Comments

SecuredTrust: A Dynamic Trust Computatio...
by RedPel on February 18, 2015 at 3:23 AM
519 Views - 0 Comments

Secure Overlay Cloud Storage with Access...
by RedPel on February 18, 2015 at 3:21 AM
570 Views - 0 Comments

Risk-Aware Mitigation for MANET Routing ...
by RedPel on February 18, 2015 at 3:20 AM
556 Views - 0 Comments

Persuasive Cued Click-Points: Design, im...
by RedPel on February 18, 2015 at 3:15 AM
549 Views - 0 Comments

pCloud: A Distributed System for Practic...
by RedPel on February 18, 2015 at 3:13 AM
592 Views - 0 Comments

Packet-Hiding Methods for Preventing Sel...
by RedPel on February 18, 2015 at 3:11 AM
644 Views - 0 Comments

Online Modeling of Proactive Moderation ...
by RedPel on February 18, 2015 at 3:09 AM
598 Views - 0 Comments

Fast and accurate annotation of short te...
by RedPel on February 18, 2015 at 3:08 AM
586 Views - 0 Comments

FADE: Secure Overlay Cloud Storage with ...
by RedPel on February 18, 2015 at 3:04 AM
570 Views - 0 Comments

Ensuring Distributed Accountability for ...
by RedPel on February 18, 2015 at 3:03 AM
590 Views - 0 Comments


1 - 12 of 25 Videos