Search Results - Java Cryptography Extension*
-
1
Authors: Jason R. Weiss
Resource Type: eBook.
Subjects: Cryptography, Java (Computer program language)
-
2
Source: Proceedings of the 7th International Conference on Web Information Systems and Technologies. :5-12
-
3
-
4
-
5
Authors:
Source: Proceedings of the 6th international symposium on Principles and practice of programming in Java. :13-22
Subject Terms: JAVA CRYPTOGRAPHY EXTENSION, COMPUTER ENGINEERING EDUCATION, VIRTUAL LABORATORY, 05 social sciences, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 0503 education
-
6
Authors:
Source: Journal of Algebraic Statistics. 2022, Vol. 13 Issue 3, p5427-5438. 12p.
Subject Terms: *IMAGE encryption, *CRYPTOGRAPHY, *JAVA programming language, *DATA security
-
7
Authors:
Resource Type: eBook.
Subjects: Cryptography, Java (Computer program language), Data encryption (Computer science), Computer security
Categories: COMPUTERS / Languages / Java, COMPUTERS / General, COMPUTERS / Languages / General, COMPUTERS / Programming / Algorithms, COMPUTERS / Security / Cryptography & Encryption, MATHEMATICS / Numerical Analysis
-
8
Authors: Roth, V.
Subject Terms: Java Development Kit, Java Cryptography Architecture, Java Cryptography Extension, crypto-enabled software, provider-independent layer, Java security architecture
Time: 006, 005
Relation: Dr. Dobb's journal; https://publica.fraunhofer.de/handle/publica/202750
Availability: https://publica.fraunhofer.de/handle/publica/202750
-
9
Authors: et al.
Source: FUDMA JOURNAL OF SCIENCES. 8:42-49
-
10
Authors:
Resource Type: eBook.
Subjects: Computer security, Cryptography, Java (Computer program language), Data encryption (Computer science)
Categories: COMPUTERS / Languages / Java, COMPUTERS / General, COMPUTERS / Languages / General, COMPUTERS / Programming / Algorithms, COMPUTERS / Security / Cryptography & Encryption, MATHEMATICS / Numerical Analysis
-
11
Authors:
Contributors:
Subject Terms: KEY WORDS
File Description: application/pdf
-
12
Authors: Roth, Volker
Source: Dr. Dobb's Journal: Software Tools for the Professional Programmer. Apr2002, Vol. 27 Issue 4, p34. 4p. 1 Color Photograph, 1 Diagram.
-
13
Authors: Wilson, Greg V. gvwilson@third-bit.com
Source: C/C++ Users Journal. Apr2005, Vol. 23 Issue 4, p61-61. 1/2p.
Subject Terms: *COMPUTER programming, NONFICTION
Reviews & Products: JAVA Cryptography Extensions: Practical Guide for Programmers (Book)
People: WEISS, Jason
-
14
Authors:
Contributors:
Subject Terms: criptografie, serializare, deserializare, cryptography, AES, Java
File Description: application/pdf
Relation: PETRUȘCA, Dorin. Analiza și implementarea mecanismelor de securitate cibernetică în dezvoltarea aplicațiilor Java: tz. de master: Programul de studiu: Securitatea Informației în Sisteme şi Rețele de Comunicații. Cond. şt. Olga CERBU. Universitatea Tehnică a Moldovei. Chişinău, 2024.; http://repository.utm.md/handle/5014/26094
Availability: http://repository.utm.md/handle/5014/26094
-
15
Authors: Arswindra, Yohanes Adven
Subject Terms: TB Information Technology
File Description: text
Relation: http://repository.usd.ac.id/3283/; http://repository.usd.ac.id/3283/1/105314016.pdf; http://repository.usd.ac.id/3283/2/105314016_full.pdf; Arswindra, Yohanes Adven (2016) Analisis unjuk kerja Java Cryptography Extension untuk enkripsi dan dekripsi file : studi kasus algoritma aes, des, 3des, dan blowfish. Skripsi thesis, Sanata Dharma Univesity.
-
16
Authors: et al.
Contributors: et al.
Subject Terms: Delegation, Public Key Infrastructure, Grid Security Infrastructure, SSL, HTTPS, Java Cryptography Architecture, Java Secure Sockets Extension
File Description: application/pdf
-
17
Authors:
Source: Dr. Dobb's Journal: Software Tools for the Professional Programmer. Nov2004, Vol. 29 Issue 11, p93-93. 1p. 1 Color Photograph.
Reviews & Products: PRAGMATIC Project Automation: How to Build, Deploy & Monitor Java Apps (Book), JAVA Cryptography Extensions: Practical Guide for Programmers (Book)
People: CLARK, Mike, WEISS, Jason
-
18
Authors: Weiss, Jason
Subject Terms: Computing and Computers
Relation: http://cds.cern.ch/record/2153124; oai:cds.cern.ch:2153124
Availability: http://cds.cern.ch/record/2153124
-
19
Authors:
Contributors:
Source: urn:tid:201195631
Subject Terms: GMP, LIP, Certified compilers, Cryptography, Mathematical operations, Big number libraries, Cryptographic algorithms, Proofs, Gcc, Compcert, Coq, AES, SSE, Processor extension, Intel, Compiladores certificados, Criptografia, Operações matemáticas, Bibliotecas de grandes números, Algoritmos criptográficos, Provas, Extensões do processador
File Description: application/pdf
Availability: https://hdl.handle.net/1822/37511
-
20
Authors: Richardson, Kert
Source: Theses
Subject Terms: Blum-Goldwasser cryptosystem, Chinese Remainder Theorem (CRT), Damgard-Jurik cryptosystem, Goldwasser-Micali cryptosystem, Homomorphic encryption, Java Cryptography Extension (JCE), Paillier cryptosystem, Probabilistic Encryption
File Description: application/pdf
Relation: https://repository.rit.edu/theses/6919; https://repository.rit.edu/context/theses/article/7924/viewcontent/KRichardsonMasterProject2005.pdf; https://repository.rit.edu/context/theses/article/7924/filename/0/type/additional/viewcontent/KRichardsonProposal2005.pdf
Nájsť tento článok vo Web of Science
Full Text Finder