Treffer 1 - 20 von 14.539

1

The Impact of Developer Experience in Using Java Cryptography
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Kruger, Stefan ; et al.
2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) Empirical Software Engineering and Measurement (ESEM), 2019 ACM/IEEE International Symposium on. :1-6 Sep, 2019

Konferenz
Merkliste
2

"Jumping Through Hoops": Why do Java Developers Struggle with Cryptography APIs?
Nadi, Sarah ; Kruger, Stefan ; Mezini, Mira ; et al.
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE) ICSE Software Engineering (ICSE), 2016 IEEE/ACM 38th International Conference on. :935-946 May, 2016

Konferenz
Merkliste
3

Java Cryptography Uses in the Wild
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Nierstrasz, Oscar

Computer Science - Crypt... Computer Science - Softw...
Report
Merkliste
4

From Struggle to Simplicity with a Usable and Secure API for Encryption in Java
Firouzi, Ehsan ; Mansuri, Ammar ; Ghafari, Mohammad ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Merkliste
5

Secure Query Processing in Delay Tolerant Network Using Java Cryptography Architecture
Johari, Rahul ; Gupta, Neelima
2011 International Conference on Computational Intelligence and Communication Networks Computational Intelligence and Communication Networks (CICN), 2011 International Conference on. :653-657 Oct, 2011

Konferenz
Merkliste
6

Java Cryptography Architecture and Security of Electronic Commerce
Shen, G. ; Zheng, X.
2008 4th International Conference on Wireless Communications, Networking and Mobile Computing Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on. :1-4 Oct, 2008

Konferenz
Merkliste
7

CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Nierstrasz, Oscar
2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER) Software Analysis, Evolution and Reengineering (SANER), 2020 IEEE 27th International Conference on. :632-636 Feb, 2020

Konferenz
Merkliste
8

A Java cryptography service provider implementing one-time pad
Lindquist, T.E. ; Diarra, M. ; Millard, B.R.
37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the System sciences System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on. :6 pp. 2004

Konferenz
Merkliste
9

Mining Cryptography Misuse in Online Forums
Braga, Alexandre ; Dahab, Ricardo
2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) Software Quality, Reliability and Security Companion (QRS-C), 2016 IEEE International Conference on. :143-150 Aug, 2016

Konferenz
Merkliste
10

64 Bit Block Cipher Cryptography Design Based on Traditional Game Patterns with West Java
Nanda Choirul
JUTEI (Jurnal Terapan Teknologi Informasi), Vol 3, Iss 1, Pp 65-73 (2019)

Block Cipher Kriptografi Pola permainan Bentengan Information technology T58.5-58.64
Fachzeitschrift
Merkliste
11

Java Cryptography API Security Enhancement Based on Annotations
Zhou, Ji-shi ; Zhang, Xiao-han ; Zhang, Yuan
Xiao xing wei xing jisuanji xitong. 40(2):367-373

Zeitschrift
Merkliste
12

Elliptic Curve Cryptography with Java
Klima, Richard E. ; Sigmon, Neil P.
7

Programming Languages Computer Science Algebra Computer Assisted Design Computer Software Coding
Fachzeitschrift
Merkliste
13

An authentication server in Java implementation of an encryption framework model and DES algorithm in Java
Batista De Almeida, L. ; Godoy, W., Jr. ; Kovaleski, J.L.
ITS'98 Proceedings. SBT/IEEE International Telecommunications Symposium (Cat. No.98EX202) Telecommunications Telecommunications Symposium, 1998. ITS '98 Proceedings. SBT/IEEE International. 2:627-631 vol.2 1998

Konferenz
Merkliste
14

601-167: Complexity of DNA Encryption System as a Subset of Java Cryptography Extension
International conference on biomedical engineering

Hodorogea, T. ; Vaida, M.-F.
IASTED INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING. CONF 6:19-24

Konferenz
Merkliste
15

A JCA-based implementation framework for threshold cryptography
Yih Huang ; Rine, D. ; Xunhua Wang
Seventeenth Annual Computer Security Applications Conference Computer security applications Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual. :85-91 2001

Konferenz
Merkliste
16

Java Cryptography on KVM and its Performance and Security Optimization using HW/SW Co-design Techniques
International conference on compilers, architecture and synthesis for embedded systems; CASES 2004

Matsuoka, Y. ; Schaumont, P. ; Tiri, K. ; et al.
INTERNATIONAL CONFERENCE ON COMPILERS ARCHITECTURE AND SYNTHESIS FOR EMBEDDED SYSTEMS. :303-311

Konferenz
Merkliste
17

Dieses Ergebnis kann Gästen nicht angezeigt werden.

18

Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform
Ye Yuan ; Kazuhide Fukushima ; Junting Xiao ; et al.
IET Information Security, Vol 15, Iss 4, Pp 267-281 (2021)

cryptography Gaussian processes Java polynomials smart cards Computer engineering. Co...
Fachzeitschrift
Merkliste
19

Time to separate from StackOverflow and match with ChatGPT for encryption
Firouzi, Ehsan ; Ghafari, Mohammad
In The Journal of Systems & Software October 2024 216

Fachzeitschrift
Merkliste
20

Jumping through hoops:why do Java developers struggle with cryptography APIs?
Nadi, Sarah ; Kruger, Stefan ; Mezini, Ermira ; et al.

E-Ressource
Merkliste

Filter