*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 4*number_thousands_separator*401

1

The Impact of Developer Experience in Using Java Cryptography
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Kruger, Stefan ; et al.
2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) Empirical Software Engineering and Measurement (ESEM), 2019 ACM/IEEE International Symposium on. :1-6 Sep, 2019

*Conference*
2

Cryptography and Cryptanalysis in Java
Stefania Loredana Nita ; Marius Iulian Mihailescu ; Stefania Loredana Nita ; et al.

Cryptography Java (Computer program l... Data encryption (Compute... Computer security
*eBook*
3

Cryptography and Cryptanalysis in Java : Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10
Stefania Loredana Nita ; Marius Iulian Mihailescu ; Stefania Loredana Nita ; et al.

Computer security Cryptography Java (Computer program l... Data encryption (Compute...
*eBook*
4

"Jumping Through Hoops": Why do Java Developers Struggle with Cryptography APIs?
Nadi, Sarah ; Kruger, Stefan ; Mezini, Mira ; et al.
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE) ICSE Software Engineering (ICSE), 2016 IEEE/ACM 38th International Conference on. :935-946 May, 2016

*Conference*
5

Java Cryptography Uses in the Wild
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Nierstrasz, Oscar

Computer Science - Crypt... Computer Science - Softw...
*Report*
6

From Struggle to Simplicity with a Usable and Secure API for Encryption in Java
Firouzi, Ehsan ; Mansuri, Ammar ; Ghafari, Mohammad ; et al.

Computer Science - Crypt... Computer Science - Softw...
*Report*
7

Secure Query Processing in Delay Tolerant Network Using Java Cryptography Architecture
Johari, Rahul ; Gupta, Neelima
2011 International Conference on Computational Intelligence and Communication Networks Computational Intelligence and Communication Networks (CICN), 2011 International Conference on. :653-657 Oct, 2011

*Conference*
8

*This result is not displayed to guests*

9

Java Cryptography Architecture and Security of Electronic Commerce
Shen, G. ; Zheng, X.
2008 4th International Conference on Wireless Communications, Networking and Mobile Computing Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on. :1-4 Oct, 2008

*Conference*
10

CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Nierstrasz, Oscar
2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER) Software Analysis, Evolution and Reengineering (SANER), 2020 IEEE 27th International Conference on. :632-636 Feb, 2020

*Conference*
11

*This result is not displayed to guests*

12

*This result is not displayed to guests*

13

A Java cryptography service provider implementing one-time pad
Lindquist, T.E. ; Diarra, M. ; Millard, B.R.
37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the System sciences System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on. :6 pp. 2004

*Conference*
14

*This result is not displayed to guests*

15

*This result is not displayed to guests*

16

Mining Cryptography Misuse in Online Forums
Braga, Alexandre ; Dahab, Ricardo
2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) Software Quality, Reliability and Security Companion (QRS-C), 2016 IEEE International Conference on. :143-150 Aug, 2016

*Conference*
17

64 Bit Block Cipher Cryptography Design Based on Traditional Game Patterns with West Java
Nanda Choirul
JUTEI (Jurnal Terapan Teknologi Informasi), Vol 3, Iss 1, Pp 65-73 (2019)

Block Cipher Kriptografi Pola permainan Bentengan Information technology T58.5-58.64
*Academic Journal*
18

*This result is not displayed to guests*

19

Java Cryptography Extensions : Practical Guide for Programmers
Jason R. Weiss ; Jason R. Weiss

Cryptography Java (Computer program l...
*eBook*
20

*This result is not displayed to guests*


*Filter*