Treffer 41 - 60 von 4.199

41

Performance Analysis of Symmetric Encryption Algorithms for their Encryption and Decryption Time
Advani, Nilesh Amarbhai ; Gonsai, Atul M.
2019 6th International Conference on Computing for Sustainable Global Development (INDIACom) Computing for Sustainable Global Development (INDIACom), 2019 6th International Conference on. :359-362 Mar, 2019

Konferenz
42

Ensuring correct cryptographic algorithm and provider usage at compile time
Xing, Weitian ; Cheng, Yuanhui ; Dietl, Werner
Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs. :43-50

Konferenz
43

Java Cryptography on KVM and its Performance and Security Optimization using HW/SW Co-design Techniques
Yusuke Matsuoka ; Patrick Schaumont ; Kris Tiri ; et al.
http://www.emsec.ee.ucla.edu/pdf/2004cases.pdf.

Performance Design Security Languages Keywords Java Cryptography Embedded Systems
Fachzeitschrift
44

Dieses Ergebnis kann Gästen nicht angezeigt werden.

45

Java Cryptography
D.M. Hutton
Kybernetes. 28

Fachzeitschrift
47

Dieses Ergebnis kann Gästen nicht angezeigt werden.

48

Compilation Techniques Specific for a Hardware Cryptography-Embedded Multimedia Mobile Processor
Masa-aki FUKASE ; Tomoaki Sato
Journal of Systemics, Cybernetics and Informatics, Vol 5, Iss 6, Pp 13-21 (2007)

Java CMOS Parallelizing Compiler Pervasive Computing Processor H/S Co-Design
Fachzeitschrift
49

Dieses Ergebnis kann Gästen nicht angezeigt werden.

50

Dieses Ergebnis kann Gästen nicht angezeigt werden.

51

Dieses Ergebnis kann Gästen nicht angezeigt werden.

52

A Lightweight Type System with Uniqueness and Typestates for the Java Cryptography API
Liu, Shuchen

type system typestates the eisop checker framew... uniqueness java cryptography api
Dissertation
53

Dieses Ergebnis kann Gästen nicht angezeigt werden.

54

An efficient mobile PACE implementation
Wiesmaier, Alex ; Horsch, Moritz ; Braun, Johannes ; et al.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :176-185

Konferenz
55

Dieses Ergebnis kann Gästen nicht angezeigt werden.

56

REKAYASA PERANGKAT LUNAK KRIPTOGRAFI MENGGUNAKAN ALGORITMA RSA PADA SISTEM KEAMANAN FILE BERBASIS JAVA
Busran ; Novernus Ayundha Putra
Jurnal Teknoif Teknik Informatika Institut Teknologi Padang, Vol 2, Iss 1 (2014)

Cryptography RSA Algorithm Java Data Security System Computer engineering. Co... TK7885-7895
Fachzeitschrift
57

Performance evaluation of three encryption/decryption algorithms
Kofahi, N.A. ; Turki Al-Somani ; Khalid Al-Zamil
2003 46th Midwest Symposium on Circuits and Systems Midwest Symposium on Circuits and Systems Circuits and Systems, 2003 IEEE 46th Midwest Symposium on. 2:790-793 Vol. 2 2003

Konferenz
58

Code protection for resource-constrained embedded devices
Saputra, H. ; Chen, G. ; Brooks, R. ; et al.
Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems. :240-248

Konferenz
59

ESES/j-Crypto and its application
Joo-Young Lee ; Ju-Han Kim ; Jung-Chan Na ; et al.
ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570) Industrial electronics - South Korea Industrial Electronics, 2001. Proceedings. ISIE 2001. IEEE International Symposium on. 2:1373-1377 vol.2 2001

Konferenz
60

An UML based framework for online and non-traceable E-cash system
Dagba, Theophile K.
2010 Fifth International Conference on Broadband and Biomedical Communications Broadband and Biomedical Communications (IB2Com), 2010 Fifth International Conference on. :1-5 Dec, 2010

Konferenz

Filter