Post a Project

RedPel

Subtitle

JAVA - SECURE COMPUTING

 
Sort: Recent | Popular Grid List
The Devils Behind Web Application Vulner...
by RedPel on February 18, 2015 at 3:28 AM
647 Views - 0 Comments

Security Architecture for Cloud Networki...
by RedPel on February 18, 2015 at 3:25 AM
651 Views - 0 Comments

SecuredTrust: A Dynamic Trust Computatio...
by RedPel on February 18, 2015 at 3:23 AM
556 Views - 0 Comments

Secure Overlay Cloud Storage with Access...
by RedPel on February 18, 2015 at 3:21 AM
599 Views - 0 Comments

Risk-Aware Mitigation for MANET Routing ...
by RedPel on February 18, 2015 at 3:20 AM
588 Views - 0 Comments

Persuasive Cued Click-Points: Design, im...
by RedPel on February 18, 2015 at 3:15 AM
586 Views - 0 Comments

pCloud: A Distributed System for Practic...
by RedPel on February 18, 2015 at 3:13 AM
637 Views - 0 Comments

Packet-Hiding Methods for Preventing Sel...
by RedPel on February 18, 2015 at 3:11 AM
691 Views - 0 Comments

Online Modeling of Proactive Moderation ...
by RedPel on February 18, 2015 at 3:09 AM
642 Views - 0 Comments

Fast and accurate annotation of short te...
by RedPel on February 18, 2015 at 3:08 AM
633 Views - 0 Comments

FADE: Secure Overlay Cloud Storage with ...
by RedPel on February 18, 2015 at 3:04 AM
616 Views - 0 Comments

Ensuring Distributed Accountability for ...
by RedPel on February 18, 2015 at 3:03 AM
628 Views - 0 Comments


1 - 12 of 25 Videos