Cloaking

Results: 102



#Item
31AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF  Site Shield Defends the origin by cloaking web infrastructure and reducing vulnerability  Everyone connected to an enterprise – customers, employees and partners – expe

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Site Shield Defends the origin by cloaking web infrastructure and reducing vulnerability Everyone connected to an enterprise – customers, employees and partners – expe

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2014-07-18 11:30:01
32Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser Hui Xiong

Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser Hui Xiong

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2007-08-20 15:05:38
338  User Experience Design and Search Engine Optimization User Experience Design’s Fundamental

8 User Experience Design and Search Engine Optimization User Experience Design’s Fundamental

Add to Reading List

Source URL: projectuxd.com

Language: English - Date: 2012-04-19 20:29:09
34AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF  Site Shield Defends the origin by cloaking web infrastructure and reducing vulnerability  Everyone connected to an enterprise – customers, employees and partners – expe

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Site Shield Defends the origin by cloaking web infrastructure and reducing vulnerability Everyone connected to an enterprise – customers, employees and partners – expe

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2014-07-18 11:30:01
35130604_Periodic Table_CS5_large

130604_Periodic Table_CS5_large

Add to Reading List

Source URL: imajayne.com.au

Language: English - Date: 2015-03-15 07:38:44
36Content Cloaking: Preserving Privacy with Google Docs and other Web Applications Gabriele D’Angelo Fabio Vitali

Content Cloaking: Preserving Privacy with Google Docs and other Web Applications Gabriele D’Angelo Fabio Vitali

Add to Reading List

Source URL: upsilon.cc

Language: English - Date: 2015-01-01 06:26:54
37Rozzle: De-Cloaking Internet Malware Clemens Kolbitsch Benjamin Livshits and Benjamin Zorn  Christian Seifert

Rozzle: De-Cloaking Internet Malware Clemens Kolbitsch Benjamin Livshits and Benjamin Zorn Christian Seifert

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-03-06 19:36:00
38Search + Seizure: The Effectiveness of Interventions on SEO Campaigns † David Y. Wang Matthew Der Mohammad Karami Lawrence Saul Damon McCoy† Stefan Savage Geoffrey M. Voelker

Search + Seizure: The Effectiveness of Interventions on SEO Campaigns † David Y. Wang Matthew Der Mohammad Karami Lawrence Saul Damon McCoy† Stefan Savage Geoffrey M. Voelker

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-09-17 17:39:46
39Cloaking and enhanced scattering of core-shell plasmonic nanowires Ali Mirzaei,∗ Ilya V. Shadrivov, Andrey E. Miroshnichenko, and Yuri S. Kivshar Nonlinear Physics Center and Center for Ultra-high bandwidth Devices for

Cloaking and enhanced scattering of core-shell plasmonic nanowires Ali Mirzaei,∗ Ilya V. Shadrivov, Andrey E. Miroshnichenko, and Yuri S. Kivshar Nonlinear Physics Center and Center for Ultra-high bandwidth Devices for

Add to Reading List

Source URL: wwwrsphysse.anu.edu.au

Language: English - Date: 2013-09-13 04:52:47
40BoxTeer Engineering Building Durham, NCNon-profit Org. US Postage

BoxTeer Engineering Building Durham, NCNon-profit Org. US Postage

Add to Reading List

Source URL: www.pratt.duke.edu

Language: English - Date: 2012-09-19 15:34:15