Significant service restrictions in the lending area from 17 March!

Showing 1 - 20 of 4,401

1

The Impact of Developer Experience in Using Java Cryptography
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Kruger, Stefan ; et al.
2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) Empirical Software Engineering and Measurement (ESEM), 2019 ACM/IEEE International Symposium on. :1-6 Sep, 2019

Conference
Save to List
2

Cryptography and Cryptanalysis in Java
Stefania Loredana Nita ; Marius Iulian Mihailescu ; Stefania Loredana Nita ; et al.

Cryptography Java (Computer program l... Data encryption (Compute... Computer security
eBook
Save to List
3

Cryptography and Cryptanalysis in Java : Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10
Stefania Loredana Nita ; Marius Iulian Mihailescu ; Stefania Loredana Nita ; et al.

Computer security Cryptography Java (Computer program l... Data encryption (Compute...
eBook
Save to List
4

"Jumping Through Hoops": Why do Java Developers Struggle with Cryptography APIs?
Nadi, Sarah ; Kruger, Stefan ; Mezini, Mira ; et al.
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE) ICSE Software Engineering (ICSE), 2016 IEEE/ACM 38th International Conference on. :935-946 May, 2016

Conference
Save to List
5

Java Cryptography Uses in the Wild
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Nierstrasz, Oscar

Computer Science - Crypt... Computer Science - Softw...
Report
Save to List
6

From Struggle to Simplicity with a Usable and Secure API for Encryption in Java
Firouzi, Ehsan ; Mansuri, Ammar ; Ghafari, Mohammad ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Save to List
7

Secure Query Processing in Delay Tolerant Network Using Java Cryptography Architecture
Johari, Rahul ; Gupta, Neelima
2011 International Conference on Computational Intelligence and Communication Networks Computational Intelligence and Communication Networks (CICN), 2011 International Conference on. :653-657 Oct, 2011

Conference
Save to List
8

This result is not available to guest users.

9

Java Cryptography Architecture and Security of Electronic Commerce
Shen, G. ; Zheng, X.
2008 4th International Conference on Wireless Communications, Networking and Mobile Computing Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on. :1-4 Oct, 2008

Conference
Save to List
10

CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Nierstrasz, Oscar
2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER) Software Analysis, Evolution and Reengineering (SANER), 2020 IEEE 27th International Conference on. :632-636 Feb, 2020

Conference
Save to List
11

This result is not available to guest users.

12

This result is not available to guest users.

13

A Java cryptography service provider implementing one-time pad
Lindquist, T.E. ; Diarra, M. ; Millard, B.R.
37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the System sciences System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on. :6 pp. 2004

Conference
Save to List
14

This result is not available to guest users.

15

This result is not available to guest users.

16

Mining Cryptography Misuse in Online Forums
Braga, Alexandre ; Dahab, Ricardo
2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) Software Quality, Reliability and Security Companion (QRS-C), 2016 IEEE International Conference on. :143-150 Aug, 2016

Conference
Save to List
17

64 Bit Block Cipher Cryptography Design Based on Traditional Game Patterns with West Java
Nanda Choirul
JUTEI (Jurnal Terapan Teknologi Informasi), Vol 3, Iss 1, Pp 65-73 (2019)

Block Cipher Kriptografi Pola permainan Bentengan Information technology T58.5-58.64
Academic journal
Save to List
18

This result is not available to guest users.

19

Java Cryptography Extensions : Practical Guide for Programmers
Jason R. Weiss ; Jason R. Weiss

Cryptography Java (Computer program l...
eBook
Save to List
20

This result is not available to guest users.


Filter