Treffer 141 - 160 von 3.449

141
142

Performance Evaluation of Java File Security System (JFSS)
Kahanwal, Brijender ; Singh, Dr. Tejinder Pal ; Tuteja, Dr. R. K.
Pelagia Research Library Advances in Applied Science Research, Vol. 2(6), pp. 254-260, 2011

Computer Science - Opera... Computer Science - Crypt... Computer Science - Perfo...
Report
Zu den Favoriten
144

Java Card for PayTv Application
Dutta, Pallab

Computer Science - Crypt...
Report
Zu den Favoriten
146

Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study
Meghanathan, Natarajan
International Journal of Network Security and its Applications (IJNSA), vol. 5, no. 1, pp. 1-16, 2013

Computer Science - Crypt... C.2.0
Report
Zu den Favoriten
147

Watermarking Java Programs using Dummy Methods with Dynamically Opaque Predicates
Akbar, Zaenal

Computer Science - Crypt... Computer Science - Softw...
Report
Zu den Favoriten
148

Project Automation & Cryptography.
Thibault, Miles ; Wilson, Gregory V.
Dr. Dobb's Journal: Software Tools for the Professional Programmer. Nov2004, Vol. 29 Issue 11, p93-93. 1p. 1 Color Photograph.

PRAGMATIC Project Automa... JAVA Cryptography Extens... CLARK, Mike WEISS, Jason
Rezension
Zu den Favoriten
149

JConstHide: A Framework for Java Source Code Constant Hiding
Sivadasan, Praveen ; Lal, P Sojan

Computer Science - Crypt...
Report
Zu den Favoriten
151

JDATATRANS for Array Obfuscation in Java Source Code to Defeat Reverse Engineering from Decompiled Codes
Sivadasan, Praveen ; Lal, P Sojan ; Sivadasan, Naveen

Computer Science - Crypt...
Report
Zu den Favoriten
152

A password-authenticated secure channel for App to Java Card applet communication
Michael Hölzl ; Endalkachew Asnake ; Rene Mayrhofer ; et al.
International Journal of Pervasive Computing and Communications, 2015, Vol. 11, Issue 4, pp. 374-397.

Fachzeitschrift
Zu den Favoriten
153

Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays
Sivadasan, Praveen ; Lal, P. Sojan

Computer Science - Crypt...
Report
Zu den Favoriten
154

Java Components Vulnerabilities - An Experimental Classification Targeted at the OSGi Platform
Parrend, Pierre ; Frénot, Stéphane

Computer Science - Crypt... Computer Science - Opera...
Report
Zu den Favoriten
155

Learning to Censor by Noisy Sampling
Chopra, Ayush ; Java, Abhinav ; Singh, Abhishek ; et al.

Computer Science - Compu... Computer Science - Crypt... Computer Science - Machi...
Report
Zu den Favoriten
156

AAC-IoT: Attribute Access Control Scheme for IoT Using Lightweight Cryptography and Hyperledger Fabric Blockchain
Suhair Alshehri ; Omaimah Bamasag
Applied Sciences, Vol 12, Iss 16, p 8111 (2022)

attribute based access c... authentication Hyperledger Fabric blockchain Internet of Things Technology
Fachzeitschrift
Zu den Favoriten
157

Secure Execution of Java Applets using a Remote Playground
Malkhi, Dahlia ; Reiter, Michael

Computer Science - Crypt... Computer Science - Netwo... C.2.0
Report
Zu den Favoriten
158

Information Security in Health Care Centre Using Cryptography and Steganography
A. O. Babatunde ; A. J. Taiwo ; E. G. Dada
Arid Zone Journal of Engineering, Technology and Environment, Vol 14, Iss 2, Pp 172-182 (2018)

Engineering (General). C... TA1-2040
Fachzeitschrift
Zu den Favoriten
159

A lightweight cryptography (LWC) framework to secure memory heap in Internet of Things
Khalifa, Mahmoud ; Algarni, Fahad ; Khan, Mohammad Ayoub ; et al.

Computer Science - Crypt...
Report
Zu den Favoriten
160

A Match Made in Heaven? Matching Test Cases and Vulnerabilities With the VUTECO Approach
Iannone, Emanuele ; Bui, Quang-Cuong ; Scandariato, Riccardo

Software Engineering Cryptography and Securit... Machine Learning D.2.5; D.2.7
Report
Zu den Favoriten

Filter