*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 2*number_thousands_separator*698

1

Securing Java Source Files Using the Cipher Cryptographic Algorithm
Asmaa Mahfoud Alhakimi ; M. Gobi ; Misbah ul Iman
Biometrics and Cryptography ISBN: 9781837682621

Image Encryption Chaos-based Image Encryp... Encryption Computer science Lightweight Ciphers Programming language
*Book*
2

*This result is not displayed to guests*

3

Securing Java RMI-based distributed applications
Ninghui Li ; Mitchell, J.C. ; Tong, D.
20th Annual Computer Security Applications Conference Computer security applications Computer Security Applications Conference, 2004. 20th Annual. :262-271 2004

*Conference*
4

Notice of Violation of IEEE Publication Principles: Securing Java-Based Mobile Agents through Byte Code Obfuscation Techniques
Shah, Syed Waqar ; Nixon, P. ; Ferguson, R.I. ; et al.
2006 IEEE International Multitopic Conference Multitopic Conference, 2006. INMIC '06. IEEE. :305-308 Dec, 2006

*Conference*
5

Securing Sensitive Data in Java Virtual Machines
Deng, Lin ; Wei, Bingyang ; Guo, Jin ; et al.
2022 IEEE/ACIS 20th International Conference on Software Engineering Research, Management and Applications (SERA) Software Engineering Research, Management and Applications (SERA), 2022 IEEE/ACIS 20th International Conference on. :128-131 May, 2022

*Conference*
6

Securing Cloud Based Transmission Through Integration of Cryptographic Method
Saudagar, Saleha ; Mahatme, Supriya ; Jadhav, Anuja ; et al.
2025 9th International Conference on Computing, Communication, Control and Automation (ICCCBEA) Computing, Communication, Control and Automation (ICCCBEA), 2025 9th International Conference on. :1-5 Aug, 2025

*Conference*
7

Securing Your Crypto-API Usage Through Tool Support - A Usability Study
Kruger, Stefan ; Reif, Michael ; Wickert, Anna-Katharina ; et al.
2023 IEEE Secure Development Conference (SecDev) SECDEV Secure Development Conference (SecDev), 2023 IEEE. :14-25 Oct, 2023

*Conference*
8

Securing web applications against SQL injection attacks - A Parameterised Query perspective)
Okesola, Julius O. ; Ogunbanwo, Afolakemi S. ; Owoade, Ayoade ; et al.
2023 International Conference on Science, Engineering and Business for Sustainable Development Goals (SEB-SDG) Science, Engineering and Business for Sustainable Development Goals (SEB-SDG), 2023 International Conference on. 1:1-6 Apr, 2023

*Conference*
9

Analysis and Research of Securing from Attack for Java Card
Wu, Yuchuan ; Sun, Yaqin
2010 International Conference on E-Business and E-Government E-Business and E-Government (ICEE), 2010 International Conference on. :1296-1298 May, 2010

*Conference*
10

Securing Class Initialization in Java-like Languages
Rafnsson, Willard ; Nakata, Keiko ; Sabelfeld, Andrei
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 10(1):1-13 Jan, 2013

*Academic Journal*
11

A Novel Secure Apriori Honey based Machine Learning Mechanism for Securing the Transactional Data
Rao, Divvela Srinivasa ; Sucharita, V.
2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS) Augmented Intelligence and Sustainable Systems (ICAISS), 2022 International Conference on. :502-508 Nov, 2022

*Conference*
12

Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments
Mofrad, S. ; Ahmed, I. ; Zhang, F. ; et al.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 19(6):4187-4203 Jan, 2022

*Academic Journal*
14

Three-Pass Protocol Scheme for Securing Image Files Using the Hill Cipher 3x3 Algorithm
Rachmawati, Dian ; Budiman, Mohammad Andri ; Habibi, Wiro Tirta
2021 International Conference on Data Science, Artificial Intelligence, and Business Analytics (DATABIA) Data Science, Artificial Intelligence, and Business Analytics (DATABIA), 2021 International Conference on. :130-135 Nov, 2021

*Conference*
15

BorderPatrol: Securing BYOD using Fine-Grained Contextual Information
Zungur, Onur ; Suarez-Tangil, Guillermo ; Stringhini, Gianluca ; et al.
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) DSN Dependable Systems and Networks (DSN), 2019 49th Annual IEEE/IFIP International Conference on. :460-472 Jun, 2019

*Conference*
16

Jalapa, securing Java with local policies: tool demonstration
Bartoletti, Massimo ; Costa, Gabriele ; Zunino, Roberto
Fourth Workshop on Bytecode Semantics, Verification, Analysis and Transformation, part of ETAPS 2009, York, UK, 2009
info:cnr-pdr/source/autori:Bartoletti M.; Gabriele G.; Zunino R./congresso_nome:Fourth Workshop on Bytecode Semantics, Verification, Analysis and Transformation, part of ETAPS 2009/congresso_luogo:York, UK/congresso_data:2009/anno:2009/pagina_da:/pagina_a:/intervallo_pagine

history-based security bytecode rewriting C.2 COMPUTER-COMMUNICATI... Usage control usage control
*Conference*
17

Evaluating and Securing Text-Based Java Code through Static Code Analysis
Jeong Yang ; Young Lee ; Amanda Fernandez ; et al.
Journal of Cybersecurity Education, Research & Practice, Vol 2020, Iss 1 (2020)

Special aspects of educa... LC8-6691
*Academic Journal*
18

Securing Dataverse with an Adapted Command Design Pattern
Durand, Gustavo ; Bar-Sinai, Michael ; Crosas, Merce
2017 IEEE Cybersecurity Development (SecDev) SECDEV Cybersecurity Development (SecDev), 2017 IEEE. :54-60 Sep, 2017

*Conference*
19

The WebLabs of the University of Cambridge: A study of securing remote instrumentation
Richter, Th. ; Watson, R. ; Kassavetis, S. ; et al.
2012 9th International Conference on Remote Engineering and Virtual Instrumentation (REV) Remote Engineering and Virtual Instrumentation (REV), 2012 9th International Conference on. :1-5 Jul, 2012

*Conference*
20

Implementing dynamic certificates for securing database
Gautam, Kiran ; Upadhyay, Divya
2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence) Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference -. :919-922 Sep, 2014

*Conference*

*Filter*