Post a Project

RedPel

Subtitle

JAVA - SECURE COMPUTING

 
Sort: Recent | Popular Grid List
Packet-Hiding Methods for Preventing Sel...
by RedPel on February 18, 2015 at 3:11 AM
612 Views - 0 Comments

Online Modeling of Proactive Moderation ...
by RedPel on February 18, 2015 at 3:09 AM
572 Views - 0 Comments

Security Architecture for Cloud Networki...
by RedPel on February 18, 2015 at 3:25 AM
570 Views - 0 Comments

pCloud: A Distributed System for Practic...
by RedPel on February 18, 2015 at 3:13 AM
567 Views - 0 Comments

The Devils Behind Web Application Vulner...
by RedPel on February 18, 2015 at 3:28 AM
564 Views - 0 Comments

Ensuring Distributed Accountability for ...
by RedPel on February 18, 2015 at 3:03 AM
561 Views - 0 Comments

Fast and accurate annotation of short te...
by RedPel on February 18, 2015 at 3:08 AM
560 Views - 0 Comments

Detecting Spam Zombies by Monitoring Ou...
by RedPel on February 18, 2015 at 2:54 AM
544 Views - 0 Comments

Secure Overlay Cloud Storage with Access...
by RedPel on February 18, 2015 at 3:21 AM
543 Views - 0 Comments

FADE: Secure Overlay Cloud Storage with ...
by RedPel on February 18, 2015 at 3:04 AM
540 Views - 0 Comments

A Learning-Based Approach to Reactive Se...
by RedPel on February 18, 2015 at 2:40 AM
535 Views - 0 Comments

PriPAYD - Privacy Friendly Pay as You Dr...
by RedPel on February 18, 2015 at 2:55 AM
530 Views - 0 Comments


1 - 12 of 25 Videos