Treffer 21 - 40 von 4.199

21

An experimental environment for teaching Java security
Riccioni, Anna ; Denti, Enrico ; Laschi, Roberto
Proceedings of the 6th international symposium on Principles and practice of programming in Java. :13-22

Konferenz
22

Time to separate from StackOverflow and match with ChatGPT for encryption
Firouzi, Ehsan ; Ghafari, Mohammad
In The Journal of Systems & Software October 2024 216

Fachzeitschrift
23

An authentication server in Java implementation of an encryption framework model and DES algorithm in Java
Batista De Almeida, L. ; Godoy, W., Jr. ; Kovaleski, J.L.
ITS'98 Proceedings. SBT/IEEE International Telecommunications Symposium (Cat. No.98EX202) Telecommunications Telecommunications Symposium, 1998. ITS '98 Proceedings. SBT/IEEE International. 2:627-631 vol.2 1998

Konferenz
24

Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform
Ye Yuan ; Kazuhide Fukushima ; Junting Xiao ; et al.
IET Information Security, Vol 15, Iss 4, Pp 267-281 (2021)

cryptography Gaussian processes Java polynomials smart cards Computer engineering. Co...
Fachzeitschrift
26

A JCA-based implementation framework for threshold cryptography
Yih Huang ; Rine, D. ; Xunhua Wang
Seventeenth Annual Computer Security Applications Conference Computer security applications Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual. :85-91 2001

Konferenz
28

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Kruger, S. ; Spath, J. ; Ali, K. ; et al.
IEEE Transactions on Software Engineering IIEEE Trans. Software Eng. Software Engineering, IEEE Transactions on. 47(11):2382-2400 Nov, 2021

Fachzeitschrift
29

Secure Database Login Using Java Cryptography
Iordache, Dorin
Volume: 2, Issue: 1
Journal of Naval Sciences and Engineering

Fachzeitschrift
30

Java Cryptography Extensions : Practical Guide for Programmers
Weiss, Jason R. ; Weiss, Jason R. ; Weiss, Jason R. ; et al.

E-Ressource
32

Enabling Efficient Threshold Signature Computation via Java Card API
Dufka, Antonín ; Švenda, Petr
Proceedings of the 18th International Conference on Availability, Reliability and Security. :1-10

Konferenz
33

Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card
Casanova-Marqués, Raúl ; Dzurenda, Petr ; Hajny, Jan
Proceedings of the 17th International Conference on Availability, Reliability and Security. :1-8

Konferenz
35

Elliptic curve cryptography : Java implementation
Edoh, Kossi D.
Proceedings of the 1st annual conference on Information security curriculum development. :88-93

Konferenz
36

Deployment-quality and Accessible Solutions for Cryptography Code Development
Rahaman, Sazzadur ; Xiao, Ya ; Afrose, Sharmin ; et al.
Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy. :174-176

Konferenz
37

Secure coding practices in Java : challenges and vulnerabilities
Meng, Na ; Nagy, Stefan ; Yao, Danfeng (Daphne) ; et al.
Proceedings of the 40th International Conference on Software Engineering. :372-383

Konferenz
38

ADVANCED ENCRYPTION STANDARD (AES) IMPLEMENTATION EFFICIENCY USING JAVA AND NODE.JS PLATFORMS
Charles Okechukwu Ugwunna ; P. E. Okimba ; O. A. Alabi ; et al.
FUDMA JOURNAL OF SCIENCES. 8:42-49

Fachzeitschrift
39

Poster : Deployment-quality and Accessible Solutions for Cryptography Code Development
Rahaman, Sazzadur ; Xiao, Ya ; Afrose, Sharmin ; et al.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. :2545-2547

Konferenz
40

Measurement of Embedding Choices on Cryptographic API Completion Tasks
author author Xiao, Song, Ahmed, Ya Wenjia Salman ; Ge, Xinyang ; author author Viswanath, Meng, Yao, Bimal Na Danfeng (Daphne) ; et al.
ACM Transactions on Software Engineering and Methodology. 33(3):1-30

Fachzeitschrift

Filter