Post a Project

RedPel

Subtitle

JAVA - SECURE COMPUTING

 
Sort: Recent | Popular Grid List
The Devils Behind Web Application Vulner...
by RedPel on February 18, 2015 at 3:28 AM
645 Views - 0 Comments

Security Architecture for Cloud Networki...
by RedPel on February 18, 2015 at 3:25 AM
648 Views - 0 Comments

SecuredTrust: A Dynamic Trust Computatio...
by RedPel on February 18, 2015 at 3:23 AM
553 Views - 0 Comments

Secure Overlay Cloud Storage with Access...
by RedPel on February 18, 2015 at 3:21 AM
598 Views - 0 Comments

Risk-Aware Mitigation for MANET Routing ...
by RedPel on February 18, 2015 at 3:20 AM
585 Views - 0 Comments

Persuasive Cued Click-Points: Design, im...
by RedPel on February 18, 2015 at 3:15 AM
582 Views - 0 Comments

pCloud: A Distributed System for Practic...
by RedPel on February 18, 2015 at 3:13 AM
633 Views - 0 Comments

Packet-Hiding Methods for Preventing Sel...
by RedPel on February 18, 2015 at 3:11 AM
688 Views - 0 Comments

Online Modeling of Proactive Moderation ...
by RedPel on February 18, 2015 at 3:09 AM
640 Views - 0 Comments

Fast and accurate annotation of short te...
by RedPel on February 18, 2015 at 3:08 AM
629 Views - 0 Comments

FADE: Secure Overlay Cloud Storage with ...
by RedPel on February 18, 2015 at 3:04 AM
613 Views - 0 Comments

Ensuring Distributed Accountability for ...
by RedPel on February 18, 2015 at 3:03 AM
625 Views - 0 Comments


1 - 12 of 25 Videos