Treffer 81 - 100 von 3.449

81

Dieses Ergebnis kann Gästen nicht angezeigt werden.

82

COMPLEXITY OF DNA ENCRYPTION SYSTEM AS A SUBSET OF JAVA CRYPTOGRAPHY EXTENSION
Hodorogea Tatiana ; Vaida Mircea-florin ; The Pennsylvania State University CiteSeerX Archives
http://users.utcluj.ro/~vaida/Publications/BioMed2008_601-167.pdf.

KEY WORDS
Fachzeitschrift
Zu den Favoriten
83

SBOM.EXE: Countering Dynamic Code Injection based on Software Bill of Materials in Java
Sharma, Aman ; Wittlinger, Martin ; Baudry, Benoit ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Zu den Favoriten
84

Java security architecture and extensions
Roth, V.

Java Development Kit Java Cryptography Archit... Java Cryptography Extens... crypto-enabled software provider-independent lay... Java security architectu...
Fachzeitschrift
Zu den Favoriten
85

Cross-ecosystem categorization: A manual-curation protocol for the categorization of Java Maven libraries along Python PyPI Topics
Paramitha, Ranindya ; Feng, Yuan ; Massacci, Fabio ; et al.

Computer Science - Softw... Computer Science - Crypt... D.2.8, D.3.2, D.2.0
Report
Zu den Favoriten
86

Secure distributed power trading protocol for networked microgrids based on blockchain and elliptic curve cryptography
Soumoud Fkaier ; Mohamed Khalgui ; Georg Frey ; et al.
IET Smart Grid, Vol 6, Iss 2, Pp 175-189 (2023)

Electrical engineering.... TK1-9971
Fachzeitschrift
Zu den Favoriten
87

An Investigation into Misuse of Java Security APIs by Large Language Models
Mousavi, Zahra ; Islam, Chadni ; Moore, Kristen ; et al.

Computer Science - Crypt... Computer Science - Compu... Computer Science - Compu...
Report
Zu den Favoriten
88

Dieses Ergebnis kann Gästen nicht angezeigt werden.

89

PPT4J: Patch Presence Test for Java Binaries
Pan, Zhiyuan ; Hu, Xing ; Xia, Xin ; et al.

Computer Science - Softw... Computer Science - Crypt...
Report
Zu den Favoriten
90

Comparing Effectiveness and Efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) Tools in a Large Java-based System
Seth, Aishwarya ; Bhattacharya, Saikath ; Elder, Sarah ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Zu den Favoriten
91

ZTD$_{JAVA}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust Dependencies
Amusuo, Paschal C. ; Robinson, Kyle A. ; Singla, Tanmay ; et al.

Computer Science - Crypt... Computer Science - Softw... K.6.5 D.4.6
Report
Zu den Favoriten
92

Dieses Ergebnis kann Gästen nicht angezeigt werden.

93

Identifying Vulnerable Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries
Chen, Tianyu ; Li, Lin ; Shan, Bingjie ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Zu den Favoriten
94

Dieses Ergebnis kann Gästen nicht angezeigt werden.

96

Montsalvat: Partitioning Java Applications to Minimize the TCB in Intel SGX
Yuhala, Peterson ; Ménétrey, Jämes ; Felber, Pascal ; et al.

Cryptography and Securit...
Report
Zu den Favoriten
97

Preventing Counterfeit Products using Cryptography, QR Code and Webservice
Cheman Shaik
Computer Science & Engineering: An International Journal. 11:1-11

0202 electrical engineer... 02 engineering and techn...
Fachzeitschrift
Zu den Favoriten
98
99

Coping with plagiarism and grading load: Randomized programming assignments and reflective grading.
Spinellis, Diomidis ; Zaharias, Panagiotis ; Vrechopoulos, Adam
Computer Applications in Engineering Education. Jun2007, Vol. 15 Issue 2, p113-123. 11p. 1 Chart.

Plagiarism Learning Internet in education Java programming languag... Cryptography Mathematical variables
Fachzeitschrift
Zu den Favoriten

Filter