Search Results - "Java Cryptography Extension"
-
1
Authors:
Source: Proceedings of the 6th international symposium on Principles and practice of programming in Java. :13-22
Subject Terms: JAVA CRYPTOGRAPHY EXTENSION, COMPUTER ENGINEERING EDUCATION, VIRTUAL LABORATORY, 05 social sciences, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 0503 education
-
2
Authors:
Contributors:
Subject Terms: KEY WORDS
File Description: application/pdf
-
3
Authors: Arswindra, Yohanes Adven
Subject Terms: TB Information Technology
File Description: text
Relation: http://repository.usd.ac.id/3283/; http://repository.usd.ac.id/3283/1/105314016.pdf; http://repository.usd.ac.id/3283/2/105314016_full.pdf; Arswindra, Yohanes Adven (2016) Analisis unjuk kerja Java Cryptography Extension untuk enkripsi dan dekripsi file : studi kasus algoritma aes, des, 3des, dan blowfish. Skripsi thesis, Sanata Dharma Univesity.
-
4
Authors: Richardson, Kert
Source: Theses
Subject Terms: Blum-Goldwasser cryptosystem, Chinese Remainder Theorem (CRT), Damgard-Jurik cryptosystem, Goldwasser-Micali cryptosystem, Homomorphic encryption, Java Cryptography Extension (JCE), Paillier cryptosystem, Probabilistic Encryption
File Description: application/pdf
Relation: https://repository.rit.edu/theses/6919; https://repository.rit.edu/context/theses/article/7924/viewcontent/KRichardsonMasterProject2005.pdf; https://repository.rit.edu/context/theses/article/7924/filename/0/type/additional/viewcontent/KRichardsonProposal2005.pdf
-
5
Authors: Roth, V.
Subject Terms: Java Development Kit, Java Cryptography Architecture, Java Cryptography Extension, crypto-enabled software, provider-independent layer, Java security architecture
Time: 006, 005
Relation: Dr. Dobb's journal; https://publica.fraunhofer.de/handle/publica/202750
Availability: https://publica.fraunhofer.de/handle/publica/202750
-
6
-
7
Authors: et al.
Source: ACM Computing Surveys; Dec2025, Vol. 57 Issue 12, p1-39, 39p
-
8
Authors: et al.
Source: FUDMA JOURNAL OF SCIENCES. 8:42-49
-
9
Authors:
Source: Communications of the ACM; Apr2023, Vol. 66 Issue 4, p29-32, 4p, 1 Color Photograph
Subject Terms: QUANTUM computing, QUANTUM cryptography, STANDARDS, ALGORITHMS, CRYPTOGRAPHY
-
10
Authors: Yudi Priyanggodo, Dyas
Source: Jurnal Teknik; Vol 14, No 1 (2025): Januari - Juni 2025 ; 2581-0006 ; 2302-8734 ; 10.31000/jt.v14i1
File Description: application/pdf
Relation: https://jurnal.umt.ac.id/index.php/jt/article/view/13732/6076; https://jurnal.umt.ac.id/index.php/jt/article/view/13732
-
11
Authors:
Source: Journal of Network & Systems Management; Mar2004, Vol. 12 Issue 1, p9-31, 23p, 2 Diagrams
-
12
Authors: et al.
Source: International Journal of Intelligent Systems; 11/19/2024, Vol. 2024, p1-18, 18p
Subject Terms: LANGUAGE models, SECURITY systems software, RESOURCE management, EMPIRICAL research, AWARENESS
-
13
Authors:
Source: International Journal of Engineering Transactions B: Applications; May2026, Vol. 39 Issue 5, p1238-1253, 16p
-
14
Authors: et al.
Source: Empirical Software Engineering; Sep2024, Vol. 29 Issue 5, p1-42, 42p
-
15
Authors: et al.
Source: Journal of Computer Security; 2024, Vol. 32 Issue 4, p319-348, 30p
Subject Terms: DATABASES, ELECTRONIC health records, HEALTH care industry, MEDICAL personnel, INFORMATION sharing
-
16
-
17
Authors:
Source: Concurrency & Computation: Practice & Experience; 6/25/2024, Vol. 36 Issue 14, p1-38, 38p
Subject Terms: QUANTUM cryptography, PUBLIC key cryptography, QUANTUM computing, INFORMATION superhighway, ELECTRIC power production, QUANTUM computers, RSA algorithm
Company/Entity: NATIONAL Institute of Standards & Technology (U.S.)
-
18
Authors:
Source: Information Security Journal: A Global Perspective; 2024, Vol. 33 Issue 3, p226-250, 25p
Subject Terms: IMAGE encryption, DYNAMICAL systems, ALGORITHMS, PIXELS
-
19
Authors:
Source: 2013 Proceedings of IEEE Southeastcon; 2013, p1-6, 6p
-
20
Nájsť tento článok vo Web of Science
Full Text Finder