Post a Project

RedPel

Subtitle

DOT NET - SECURE COMPUTING

 
Sort: Recent | Popular Grid List
Design and Implementation of TARF- A Tru...
by RedPel on February 19, 2015 at 9:03 AM
600 Views - 0 Comments

Privacy-Preserving Updates to Anonymous ...
by RedPel on February 19, 2015 at 9:01 AM
599 Views - 0 Comments

Recommendation Models For Open Authoriza...
by RedPel on February 19, 2015 at 9:15 AM
594 Views - 0 Comments

Fast Matrix Embedding by Matrix Extendi...
by RedPel on February 19, 2015 at 9:08 AM
591 Views - 0 Comments

The Geometric Efficient Matching A...
by RedPel on February 19, 2015 at 9:07 AM
587 Views - 0 Comments

Secure Service Oriented Architecture for...
by RedPel on February 19, 2015 at 9:06 AM
586 Views - 0 Comments

On Privacy of Encrypted Speech Communica...
by RedPel on February 19, 2015 at 9:12 AM
575 Views - 0 Comments

A Policy Enforcing Mechanism for Trusted...
by RedPel on February 19, 2015 at 8:48 AM
561 Views - 0 Comments

Steganography Bit Plane Complexity Segm...
by RedPel on February 19, 2015 at 9:18 AM
560 Views - 0 Comments

Packet-Hiding Methods for Preventing Sel...
by RedPel on February 19, 2015 at 9:14 AM
558 Views - 0 Comments

A Probabilistic Model of (t,n) Visual C...
by RedPel on February 19, 2015 at 8:47 AM
557 Views - 0 Comments

Robust Correlation of Encrypted Attack ...
by RedPel on February 19, 2015 at 9:04 AM
528 Views - 0 Comments


1 - 12 of 21 Videos