Private peer-to-peer

Results: 66



#Item
11BUSINESS ACTION AGAINST CORRUPTION ‘Public private partnership to strengthen governance’ Corruption is a global problem; it prevails in one form or another in all countries and regions. However, combating corruption

BUSINESS ACTION AGAINST CORRUPTION ‘Public private partnership to strengthen governance’ Corruption is a global problem; it prevails in one form or another in all countries and regions. However, combating corruption

Add to Reading List

Source URL: www.baacafrica.org

Language: English - Date: 2012-03-22 07:42:31
12Nusoft Newsletter – IR Series No.28 Tech Overview : Advanced Authentication Management for IT Administrators

Nusoft Newsletter – IR Series No.28 Tech Overview : Advanced Authentication Management for IT Administrators

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English - Date: 2012-10-23 00:46:27
13The Daily Startup: Payment-Tech VC Surges, M&A Should Follow By Zoran Basich

The Daily Startup: Payment-Tech VC Surges, M&A Should Follow By Zoran Basich

Add to Reading List

Source URL: www.canvas.vc

Language: English - Date: 2014-07-25 16:04:22
14Videotelephony / Server / Client–server model / Peer-to-peer / Concurrent computing / Microsoft Certified Professional / Cisco Career Certifications / Computing / Cisco Systems / Deep packet inspection

David Christie & Associates P/L Private & Confidential < DATE @ "d-MMM-yy" * MERGEFORMAT >17-Nov-04

Add to Reading List

Source URL: www.careercafe.com.au

Language: English - Date: 2010-06-14 11:08:05
15Microsoft Word - Revisiting Alternative Compensation Schemes_For Website.docx

Microsoft Word - Revisiting Alternative Compensation Schemes_For Website.docx

Add to Reading List

Source URL: www.ivir.nl

Language: English - Date: 2014-10-02 10:07:30
16The difficulties of a peer-to-peer VPN on the hostile Internet The difficulties of a peer-to-peer VPN on the

The difficulties of a peer-to-peer VPN on the hostile Internet The difficulties of a peer-to-peer VPN on the

Add to Reading List

Source URL: www.tinc-vpn.org

Language: English - Date: 2010-02-08 07:07:20
17Private Communication Through a Network of Trusted Connections: The Dark Freenet Ian Clarke ⋆ , Oskar Sandberg ⋆⋆

Private Communication Through a Network of Trusted Connections: The Dark Freenet Ian Clarke ⋆ , Oskar Sandberg ⋆⋆

Add to Reading List

Source URL: freenetproject.org

Language: English - Date: 2010-03-09 08:45:21
18Enabling Private Continuous Queries For Revealed User Locations ⋆ Chi-Yin Chow and Mohamed F. Mokbel Department of Computer Science and Engineering, University of Minnesota {cchow, mokbel}@cs.umn.edu

Enabling Private Continuous Queries For Revealed User Locations ⋆ Chi-Yin Chow and Mohamed F. Mokbel Department of Computer Science and Engineering, University of Minnesota {cchow, mokbel}@cs.umn.edu

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:41
19Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval C.M. Swanson and D.R. Stinson? David C. Cheriton School of Computer Science University of Waterloo

Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval C.M. Swanson and D.R. Stinson? David C. Cheriton School of Computer Science University of Waterloo

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-03 19:40:35
20Scalable discovery of private resources Spyros Kotoulas and Ronny Siebes Vrije Universiteit Amsterdam Department of Computer Science De Boelelaan 1081, 1081HV, Amsterdam {kot,ronny}@few.vu.nl

Scalable discovery of private resources Spyros Kotoulas and Ronny Siebes Vrije Universiteit Amsterdam Department of Computer Science De Boelelaan 1081, 1081HV, Amsterdam {kot,ronny}@few.vu.nl

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2007-07-16 16:44:36