Treffer 1 - 20
von 14.539
- 1
- 2
Seite in der Trefferliste auswählen
The Impact of Developer Experience in Using Java Cryptography
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Kruger, Stefan ; et al.
2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) Empirical Software Engineering and Measurement (ESEM), 2019 ACM/IEEE International Symposium on. :1-6 Sep, 2019
"Jumping Through Hoops": Why do Java Developers Struggle with Cryptography APIs?
Nadi, Sarah ; Kruger, Stefan ; Mezini, Mira ; et al.
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE) ICSE Software Engineering (ICSE), 2016 IEEE/ACM 38th International Conference on. :935-946 May, 2016
Java Cryptography Uses in the Wild
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Nierstrasz, Oscar
From Struggle to Simplicity with a Usable and Secure API for Encryption in Java
Firouzi, Ehsan ; Mansuri, Ammar ; Ghafari, Mohammad ; et al.
Secure Query Processing in Delay Tolerant Network Using Java Cryptography Architecture
Johari, Rahul ; Gupta, Neelima
2011 International Conference on Computational Intelligence and Communication Networks Computational Intelligence and Communication Networks (CICN), 2011 International Conference on. :653-657 Oct, 2011
Java Cryptography Architecture and Security of Electronic Commerce
Shen, G. ; Zheng, X.
2008 4th International Conference on Wireless Communications, Networking and Mobile Computing Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on. :1-4 Oct, 2008
CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Nierstrasz, Oscar
2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER) Software Analysis, Evolution and Reengineering (SANER), 2020 IEEE 27th International Conference on. :632-636 Feb, 2020
A Java cryptography service provider implementing one-time pad
Lindquist, T.E. ; Diarra, M. ; Millard, B.R.
37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the System sciences System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on. :6 pp. 2004
Mining Cryptography Misuse in Online Forums
Braga, Alexandre ; Dahab, Ricardo
2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) Software Quality, Reliability and Security Companion (QRS-C), 2016 IEEE International Conference on. :143-150 Aug, 2016
64 Bit Block Cipher Cryptography Design Based on Traditional Game Patterns with West Java
Nanda Choirul
JUTEI (Jurnal Terapan Teknologi Informasi), Vol 3, Iss 1, Pp 65-73 (2019)
Java Cryptography API Security Enhancement Based on Annotations
Zhou, Ji-shi ; Zhang, Xiao-han ; Zhang, Yuan
Xiao xing wei xing jisuanji xitong. 40(2):367-373
Elliptic Curve Cryptography with Java
Klima, Richard E. ; Sigmon, Neil P.
7
An authentication server in Java implementation of an encryption framework model and DES algorithm in Java
Batista De Almeida, L. ; Godoy, W., Jr. ; Kovaleski, J.L.
ITS'98 Proceedings. SBT/IEEE International Telecommunications Symposium (Cat. No.98EX202) Telecommunications Telecommunications Symposium, 1998. ITS '98 Proceedings. SBT/IEEE International. 2:627-631 vol.2 1998
601-167: Complexity of DNA Encryption System as a Subset of Java Cryptography Extension
International conference on biomedical engineering
Hodorogea, T. ; Vaida, M.-F.
IASTED INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING. CONF 6:19-24
A JCA-based implementation framework for threshold cryptography
Yih Huang ; Rine, D. ; Xunhua Wang
Seventeenth Annual Computer Security Applications Conference Computer security applications Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual. :85-91 2001
Java Cryptography on KVM and its Performance and Security Optimization using HW/SW Co-design Techniques
International conference on compilers, architecture and synthesis for embedded systems; CASES 2004
Matsuoka, Y. ; Schaumont, P. ; Tiri, K. ; et al.
INTERNATIONAL CONFERENCE ON COMPILERS ARCHITECTURE AND SYNTHESIS FOR EMBEDDED SYSTEMS. :303-311
Dieses Ergebnis kann Gästen nicht angezeigt werden.
Login für vollen Zugriff.
Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform
Ye Yuan ; Kazuhide Fukushima ; Junting Xiao ; et al.
IET Information Security, Vol 15, Iss 4, Pp 267-281 (2021)
Time to separate from StackOverflow and match with ChatGPT for encryption
Firouzi, Ehsan ; Ghafari, Mohammad
In The Journal of Systems & Software October 2024 216
Jumping through hoops:why do Java developers struggle with cryptography APIs?
Nadi, Sarah ; Kruger, Stefan ; Mezini, Ermira ; et al.
- 1
- 2