Uploads
Contact
/
Login
Upload
Search Results for 'Secure Information Sharing Using'
xShare : Supporting Impromptu Sharing of Mobile Phones
faustina-dinatale
Sharing in SharePoint 2013
calandra-battersby
Principles of Secure Information Flow Analysis Georey Smith School of Computing and Information
lindy-dunigan
Secure development (for a secure planet)
alexa-scheidler
Sharing Assemblies
tatyana-admore
Inventions, Data Sharing, Reports to NIH, and other Intellectual Property Considerations
briana-ranney
Sharing Experiences:
liane-varnes
Sharing and Management of Disaster Related Data
natalia-silvester
Sharing Features Between Objects and Their Attributes
lois-ondreau
Adaptively Secure Broadcast, Revisited
luanne-stotts
Perfect for sharing Pane rustico 3.95Artisanal grain loaf, crispy Sard
marina-yarberry
MACs Towards More Secure and More Ecient Constructions
mitsue-stanley
Scaling Secure Computation Using the Cloud
debby-jeon
Social Media as Information
cheryl-pisano
A Decade of Secure, Hosted
debby-jeon
Abusing and Attacking Content Sharing Solutions
trish-goza
Semantics-preserving Sharing Actors
debby-jeon
“Enabling Seamless Data Sharing in Industry and Academia”
yoshiko-marsland
Memory Buddies: Exploiting Page Sharing for
luanne-stotts
Sharing Features Between Visual Tasks at Different Levels o
giovanna-bartolotta
Smart Knowledge Sharing
olivia-moreira
Secret Sharing in Distributed Storage Systems
tatyana-admore
The Other ROI – Can Business Development (BD) Get A Retu
sherrill-nordquist
Roxio Secure solutions Rob Griffith
marina-yarberry
1
2
3
4
5
6
7
8
9
10