Limpar
17 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto

Cheman Shaik,

... software code written for cryptographic operations using the Java cryptography Extension and QR code operations using Google Zxing libraries.

Tópico(s): Spam and Phishing Detection

2021 - | Computer Science & Engineering An International Journal

Artigo Acesso aberto

Najib A. Kofahi,

... Java programming language, Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE).The evaluation of the performance of these ...

Tópico(s): Cryptographic Implementations and Security

2013 - Science and Engineering Research Support Society | International Journal of Security and Its Applications

Artigo

C. J. Lamprecht, Moorsel van, Mark Tomlinson, Nigel Thomas,

... TSIK as well as of an implementation using Java Cryptography Extensions (JCE), we conclude that TSIK provides an adequate ...

Tópico(s): Cloud Data Security Solutions

2006 - | International Journal of Simulation Systems Science & Technology

Artigo Revisado por pares

Matjaž B. Jurič, Ivan Rozman, Boštjan Brumen, Matjaž Colnarič, Marjan Heričko,

... usage of security and the influences of JCE (Java Cryptography Extension) security providers on the performance of secured remote ...

Tópico(s): Distributed and Parallel Computing Systems

2005 - Elsevier BV | Journal of Systems and Software

Capítulo de livro Revisado por pares

Haeng-Kon Kim, Hae-Sool Yang,

... of security features using Java Cryptography Architecture (JCA), Java Cryptography Extension (JCE) and Java Secure Socket Extension (JSSE) API provided by Sun ...

Tópico(s): Security and Verification in Computing

2005 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Revisado por pares

Ying Cai, Ning Li, Chengxia Liu,

... The API is implemented by Java Cryptography Architecture, Java Cryptography Extension, Dom4j, and XPath technologies on Java platform and is confirmed to XML Digital Signature ...

Tópico(s): Power Systems and Technologies

2012 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto

Charles Okechukwu Ugwunna, P. E. Okimba, Orobosade Alabi, E. E. Orji, E. O. Olowofeso, S. O. Ayomide,

... It utilizes the Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE) to create an optimized runtime environment with advanced cryptographic libraries. The result indicate that Java's AES-128 implementation is more efficient than ...

Tópico(s): Advanced Data Storage Technologies

2024 - | FUDMA Journal of Sciences

Capítulo de livro Revisado por pares

Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto,

... cryptosystems (PBC) have been attracted by researchers in cryptography. Some implementations show that PBC are relatively slower than the standard public key cryptosystems. We present an efficient implementation for computing Tate pairing on a mobile phone using Java. We implemented the η T pairing (a recent efficient variation of Duursma-Lee algorithm) over some finite fields of characteristic 3 with extension degree m = { 97, 167, 193, 239 }. Our optimized ...

Tópico(s): Geometric and Algebraic Topology

2007 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro

Hala S. Ali, R. Sridevi,

... of the proposed approach using iFogSim simulator and Java Cryptography Architecture (JCA) library. The results show that the ...

Tópico(s): Cloud Data Security Solutions

2022 - Springer International Publishing | Lecture notes in networks and systems

Artigo Acesso aberto

Akansha Deshmukh,

... cryptographic algorithms RSA and ECC.The elliptic curve cryptography is implemented on smart card using Menezes-Vanstone Elliptic Curve Cryptosystem and Nyberg-Rueppel Signature Scheme [2].The implementation of these algorithms is done using Java Card technology.The test results are analysed and ...

Tópico(s): Cryptographic Implementations and Security

2012 - | International Journal of Advanced Information Technology

Capítulo de livro Acesso aberto Revisado por pares

Ralf Küsters, Enrico Scapin, Tomasz Truderung, Jürgen Graf,

... noninterference properties but a priori cannot deal with cryptography to establish cryptographic indistinguishability properties, such as privacy properties, for Java programs. We refer to this framework as the ... To illustrate the usefulness and applicability of the extensions proposed in this paper, we apply the framework along with the tool Joana, which allows for the fully automatic verification of noninterference properties of Java programs, to establish cryptographic privacy properties of a ( ...

Tópico(s): Cloud Data Security Solutions

2014 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Brasil Produção Nacional

Juliana Kaizer Vizzotto, Bruno Crestani Calegaro,

... Java library for quantum programming. We use the extension of the programming language Java called BGGA Closure, that allow the manipulation of ...

Tópico(s): Quantum Information and

2015 - | Revista de Informática Teórica e Aplicada

Capítulo de livro Revisado por pares

Que Nguyet Tran Thi, Tran Khanh Dang,

... and fine grained. Besides, we also present an extension from the ABAC model for privacy protection with the approach of purpose usage. The notion of purpose is associated with levels of data disclosure and constraints to support more fine-grained privacy policies. A prototype built for the proposed model using Java and MongoDB has also presented in the paper. ...

Tópico(s):

2017 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro

David Garlan, Mary Shaw,

... No. 3I2SD: Reverse Engineering Sequence Diagrams from Enterprise Java Beans with InterceptorsSerguei Roubtsov, Alexander Serebrenik, Aurelien Mazoyer ...

Tópico(s): Software System Performance and Reliability

1993 - | Series on software engineering and knowledge engineering

Capítulo de livro Revisado por pares

Chuyi Yan, Haixia Xu, Yongheng Mu, Jiong Ding,

... is the first SM9-IBS (Identity-based Signature) extension. Also, we prove its security is existentially unforgeable under adaptive chosen message and identity attacks (EUF-CMIA) in the standard model. At the same time, the implementation of our scheme using Java does not lead to an additional performance burden ...

Tópico(s): Complexity and Algorithms in Graphs

2022 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Johann Großschädl,

... especially for multi-application smart cards (e.g. Java cards) with an embedded 32-bit RISC core.

Tópico(s): Coding theory and

2003 - SAGE Publishing | The International Journal of High Performance Computing Applications

Outro Acesso aberto

Simone Cirani, Gianluigi Ferrari, Marco Picone, Luca Veltri,

... Veltri, L. (2014) mjCoAP: An open-source lightweight Java CoAP library for Internet of Things applications, in ... R.M. and Wheeler, D.J. (1997) TEA Extensions, Tech. Rep., University of Cambridge. Standaert, F.X., ... ISO/IEC (2012) Information Technology – Security Techniques – Lightweight Cryptography – Part 2: Block Ciphers, ISO/IEC standard 29192- ... URL http://www.ieee.org. Standards for Efficient Cryptography Group. URL http://secs.org. National Institute of ...

Tópico(s): Opportunistic and Delay-Tolerant Networks

2018 - Springer Science+Business Media | Internet of things