Secret key distribution protocol using public key cryptography
Journal of Computing Sciences in Colleges
Cryptography and computer security for undergraduates
Proceedings of the 35th SIGCSE technical symposium on Computer science education
Active Service for Mobile Middleware
World Wide Web
A secured hierarchical trust management framework for public computing utilities
CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
Developing certificate-based projects for web security classes
Journal of Computing Sciences in Colleges
Information assurance in the undergraduate curriculum
Proceedings of the 43rd annual Southeast regional conference - Volume 1
Business Model and Comparasion of S/W Source Code vs. Digital License for IPRs
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Study of digital license search for intellectual property rights of S/W source code
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
A proactive secret sharing for server assisted threshold signatures
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Securing admission control in ubiquitous computing environment
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Hi-index | 0.00 |
From the Publisher:As Java emerges as the standard platform for Internet programming, the ability to securely move its code around is imperative for application security in large-scale e-commerce and e-business sites - many of which have suffered a recent spate of hacker attacks. Security is one of the key features of the Java language architecture, giving its users confidence in downloading code across networks.Professional Java Security presents everything that a Java programmer needs to know about secure application design and programming. It begins with simple examples and descriptions and builds to a comprehensive cookbook of solutions. Topics covered include SSL, cryptography, authentication, and access control.