Treffer 41 - 60 von 34.625

41

An evaluation of the Java security model
Sterbenz, A.
Proceedings 12th Annual Computer Security Applications Conference Computer security applications Computer Security Applications Conference, 1996., 12th Annual. :2-14 1996

Konferenz
42

Java security extensions for a Java server in a hostile environment
Wheeler, D.M. ; Conyers, A. ; Luo, J. ; et al.
Seventeenth Annual Computer Security Applications Conference Computer security applications Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual. :64-73 2001

Konferenz
43

Detecting Security Patches in Java Projects Using NLP Technology
Stefanoni, Andrea ; Girdzijauskas, Sarunas ; Jenkins, Christina ; et al.

E-Ressource
44

Performance of the Java security manager
Herzog, Almut ; Shahmehri, Nahid
In Computers & Security 2005 24(3):192-207

Fachzeitschrift
45

Java Security: A Ten Year Retrospective
Gong, Li
2009 Annual Computer Security Applications Conference Computer Security Applications Conference, 2009. ACSAC '09. Annual. :395-405 Dec, 2009

Konferenz
46

PPT4J: Patch Presence Test for Java Binaries
Pan, Zhiyuan ; Hu, Xing ; Xia, Xin ; et al.

Computer Science - Softw... Computer Science - Crypt...
Report
47

Java Programming for Cybersecurity Applications
Practical Java Programming for IoT, AI, and Blockchain. Jul 07, 2022

Buch
48

A model and design of a security provider for Java applications
Abbasi, Abdul Gahafoor ; Muftic, Sead ; Schmolzer, Gernot
2009 International Conference for Internet Technology and Secured Transactions, (ICITST) Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for. :1-7 Nov, 2009

Konferenz
49

Research on NTRU Algorithm for Mobile Java Security
Shen, Xiaoyu ; Du, Zhenjun ; Chen, Rong
2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing Scalable Computing and Communications; Eighth International Conference on Embedded Computing, 2009. SCALCOM-EMBEDDEDCOM'09. International Conference on. :366-369 Sep, 2009

Konferenz
50

Java Cryptography Architecture and Security of Electronic Commerce
Shen, G. ; Zheng, X.
2008 4th International Conference on Wireless Communications, Networking and Mobile Computing Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on. :1-4 Oct, 2008

Konferenz
51

An experimental environment for teaching Java security
DENTI, ENRICO ; LASCHI, ROBERTO ; RICCIONI, ANNA
Proceedings of the 6th international symposium on Principles and practice of programming in Java. :13-22

JAVA CRYPTOGRAPHY EXTENS... COMPUTER ENGINEERING EDU... VIRTUAL LABORATORY 05 social sciences 0202 electrical engineer... 02 engineering and techn...
Fachzeitschrift
52

Java security: present and near future
Li Gong
IEEE Micro Micro, IEEE. 17(3):14-19 Jun, 1997

Fachzeitschrift
53

ZTD$_{JAVA}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust Dependencies
Amusuo, Paschal C. ; Robinson, Kyle A. ; Singla, Tanmay ; et al.

Computer Science - Crypt... Computer Science - Softw... K.6.5 D.4.6
Report
54

A formal dynamic semantics of Java: an essential ingredient of Java security
Mourad Debbabi ; Nadia Tawbi ; Hamdi Yahyaoui
Journal of Telecommunications and Information Technology, Iss 4 (2002)

static analysis operational semantics Telecommunication security dynamic semantics TK5101-6720
Fachzeitschrift
55

Identifying Vulnerable Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries
Chen, Tianyu ; Li, Lin ; Shan, Bingjie ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
56

Security Matters: Safeguarding Java Applications in an Era of Increasing Cyber Threats
Pavani Surarapu
Asian Journal of Applied Science and Engineering. 6:169-176

Fachzeitschrift
57

Experiences with embedding MPL security monitors into Java programs
Mäkelä, Jari-Matti ; Leppänen, Ville
Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing. :1-6

Konferenz
58

Low Level Security in Java
Yellin, Frank
Proceedings of the Fourth International Conference on World Wide Web. :369-379

Konferenz
59

A Java Data Security Framework (JDSF) and its Case Studies
Mokhov, Serguei A. ; Huynh, Lee Wei ; Li, Jian ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report

Filter