A java API for historical ciphers: an object-oriented design project
Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education
A Java implementation of an elliptic curve cryptosystem
PPPJ '02/IRE '02 Proceedings of the inaugural conference on the Principles and Practice of programming, 2002 and Proceedings of the second workshop on Intermediate representation engineering for virtual machines, 2002
Java Based E-Commerce middleware
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
A Java OpenCard framework based medical smartcard system
PPPJ '03 Proceedings of the 2nd international conference on Principles and practice of programming in Java
A Java implemented key collision attack on the data encryption standard (DES)
PPPJ '03 Proceedings of the 2nd international conference on Principles and practice of programming in Java
Design and implementation of secure e-mail system using elliptic curve cryptosystem
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
An Identity Based Encryption system
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
An Empirical Study on the Performance of Java/.Net Cryptographic APIs
Information Systems Security
Usability and performance of secure mobile messaging using public key infrastructure
DNCOCO'08 Proceedings of the 7th conference on Data networks, communications, computers
Usability and performance of secure mobile messaging: M-PKI
WSEAS Transactions on Information Science and Applications
FIE'09 Proceedings of the 39th IEEE international conference on Frontiers in education conference
Hi-index | 0.00 |
Java Cryptography teaches you how to write secure programs using Java's cryptographic tools. It includes thorough discussions of the java.security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even implement your own provider. It discusses authentication, key management, public and private key encryption, and includes a secure talk application that encrypts all data sent over the network. If you work with sensitive data, you'll find this book indispensable.