Suchergebnisse - Java Cryptography Extension~
-
1
Autoren: Jason R. Weiss
Resource Type: eBook.
Schlagworte: Cryptography, Java (Computer program language)
-
2
-
3
Autoren:
Quelle: Proceedings of the 6th international symposium on Principles and practice of programming in Java. :13-22
Schlagwörter: JAVA CRYPTOGRAPHY EXTENSION, COMPUTER ENGINEERING EDUCATION, VIRTUAL LABORATORY, 05 social sciences, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 0503 education
-
4
Autoren: Roth, V.
Schlagwörter: Java Development Kit, Java Cryptography Architecture, Java Cryptography Extension, crypto-enabled software, provider-independent layer, Java security architecture
Time: 006, 005
Relation: Dr. Dobb's journal; https://publica.fraunhofer.de/handle/publica/202750
Verfügbarkeit: https://publica.fraunhofer.de/handle/publica/202750
-
5
Autoren: et al.
Quelle: FUDMA JOURNAL OF SCIENCES. 8:42-49
-
6
Autoren:
Weitere Verfasser:
Schlagwörter: KEY WORDS
Dateibeschreibung: application/pdf
-
7
Autoren: Roth, Volker
Quelle: Dr. Dobb's Journal: Software Tools for the Professional Programmer. Apr2002, Vol. 27 Issue 4, p34. 4p. 1 Color Photograph, 1 Diagram.
-
8
Autoren:
Weitere Verfasser:
Schlagwörter: criptografie, serializare, deserializare, cryptography, AES, Java
Dateibeschreibung: application/pdf
Relation: PETRUȘCA, Dorin. Analiza și implementarea mecanismelor de securitate cibernetică în dezvoltarea aplicațiilor Java: tz. de master: Programul de studiu: Securitatea Informației în Sisteme şi Rețele de Comunicații. Cond. şt. Olga CERBU. Universitatea Tehnică a Moldovei. Chişinău, 2024.; http://repository.utm.md/handle/5014/26094
Verfügbarkeit: http://repository.utm.md/handle/5014/26094
-
9
Autoren: Arswindra, Yohanes Adven
Schlagwörter: TB Information Technology
Dateibeschreibung: text
Relation: http://repository.usd.ac.id/3283/; http://repository.usd.ac.id/3283/1/105314016.pdf; http://repository.usd.ac.id/3283/2/105314016_full.pdf; Arswindra, Yohanes Adven (2016) Analisis unjuk kerja Java Cryptography Extension untuk enkripsi dan dekripsi file : studi kasus algoritma aes, des, 3des, dan blowfish. Skripsi thesis, Sanata Dharma Univesity.
-
10
Autoren:
Weitere Verfasser:
Quelle: urn:tid:201195631
Schlagwörter: GMP, LIP, Certified compilers, Cryptography, Mathematical operations, Big number libraries, Cryptographic algorithms, Proofs, Gcc, Compcert, Coq, AES, SSE, Processor extension, Intel, Compiladores certificados, Criptografia, Operações matemáticas, Bibliotecas de grandes números, Algoritmos criptográficos, Provas, Extensões do processador
Dateibeschreibung: application/pdf
Verfügbarkeit: https://hdl.handle.net/1822/37511
-
11
Autoren: Richardson, Kert
Quelle: Theses
Schlagwörter: Blum-Goldwasser cryptosystem, Chinese Remainder Theorem (CRT), Damgard-Jurik cryptosystem, Goldwasser-Micali cryptosystem, Homomorphic encryption, Java Cryptography Extension (JCE), Paillier cryptosystem, Probabilistic Encryption
Dateibeschreibung: application/pdf
Relation: https://repository.rit.edu/theses/6919; https://repository.rit.edu/context/theses/article/7924/viewcontent/KRichardsonMasterProject2005.pdf; https://repository.rit.edu/context/theses/article/7924/filename/0/type/additional/viewcontent/KRichardsonProposal2005.pdf
-
12
Autoren:
Quelle: Journal of Network & Systems Management; Mar2004, Vol. 12 Issue 1, p9-31, 23p, 2 Diagrams
-
13
Autoren: Cheman Shaik
Quelle: Computer Science & Engineering: An International Journal. 11:1-11
-
14
-
15
Autoren:
Resource Type: eBook.
Schlagworte: Cryptography, Java (Computer program language), Data encryption (Computer science), Computer security
Categories: COMPUTERS / Languages / Java, COMPUTERS / General, COMPUTERS / Languages / General, COMPUTERS / Programming / Algorithms, COMPUTERS / Security / Cryptography & Encryption, MATHEMATICS / Numerical Analysis
-
16
Autoren:
Resource Type: eBook.
Schlagworte: Computer security, Cryptography, Java (Computer program language), Data encryption (Computer science)
Categories: COMPUTERS / Languages / Java, COMPUTERS / General, COMPUTERS / Languages / General, COMPUTERS / Programming / Algorithms, COMPUTERS / Security / Cryptography & Encryption, MATHEMATICS / Numerical Analysis
-
17
-
18
Autoren: et al.
Quelle: Health & Technology; Nov2024, Vol. 14 Issue 6, p1083-1096, 14p
-
19
Weitere Verfasser: Muftic, Sead
Dateibeschreibung: Medium: ED; Size: 425 kb
Zugangs-URL: http://www.osti.gov/scitech/servlets/purl/894922
-
20
Autoren:
Quelle: Lecture Notes in Computer Science ISBN: 9783642340611
Nájsť tento článok vo Web of Science
Full Text Finder