DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Wuala
Wuala
Inside Dropbox: Understanding Personal Cloud Storage Services
4-BAY RACKMOUNT NAS Technical Specifications
The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
Building Large-Scale Distributed Applications on Top of Self-Managing Transactional Stores
Mass Surveillance
On the Security of Cloud Storage Services
Online Research Tools
Online Security for Independent Media and Civil Society Activists
(More) Side Channels in Cloud Storage Linking Data to Users
Twice the Storage Capacity in Half the Space 8-BAY
A Measurement Study of the Wuala On-Line Storage Service
Secure Dropbox Alternatives Comparison Chart*
Improved Secure Stream Cipher for Cloud Computing
Lacie 5Big Nas Pro User Manual
A Cloud Based Privacy Preserving Decentralized Personalized Online Social Network
Safezone Browser Download Cent Safezone Browser Download Cent
Sicheres Cloud Computing in Der Praxis
At Commands, Tor-Based Communications: Meet Attor, a Fantasy Creature and Also a Spy Platform
Top View
Business Storage 8-Bay Rackmount NAS Competitive Overview
Benchmarking Personal Cloud Storage
Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers
Efficient Cross User Client Side Data Deduplication in Hadoop
Mass Surveillance Part 1 - Risks and Opportunities Raised by the Current Generation of Network Services and Applications
Dimitar Hristovski.Pdf
Cloudbox User Manual
Techno-Social Platform for Sustainable Models and Value Generation in Commons-Based Peer Production in the Future Internet
To Share Or Not to Share in Client-Side Encrypted Clouds
On the Security of Cloud Storage Services
The Overhead of Confidentiality and Client-Side Encryption in Cloud Storage Systems
Online Research Tools
The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
Academic Freedom Or Application Chaos an Analysis of Application Usage on University Networks
FTC Complaint Charges Dropbox
ENCRYPTION POLICY for HUMAN RIGHTS DEFENDERS “It Is Neither Fanciful Nor an Exaggeration to Say That, Without Encryption Tools, Lives May Be Endangered.”
Privacy Shielding Against Mass Surveillance
Digital Evidence Identification on Google Drive in Android Device Using NIST Mobile Forensic Method