... software code written for cryptographic operations using the Java cryptography Extension and QR code operations using Google Zxing libraries.
Tópico(s): Spam and Phishing Detection
2021 - | Computer Science & Engineering An International Journal
... Java programming language, Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE).The evaluation of the performance of these ...
Tópico(s): Cryptographic Implementations and Security
2013 - Science and Engineering Research Support Society | International Journal of Security and Its Applications
C. J. Lamprecht, Moorsel van, Mark Tomlinson, Nigel Thomas,
... TSIK as well as of an implementation using Java Cryptography Extensions (JCE), we conclude that TSIK provides an adequate ...
Tópico(s): Cloud Data Security Solutions
2006 - | International Journal of Simulation Systems Science & Technology
Matjaž B. Jurič, Ivan Rozman, Boštjan Brumen, Matjaž Colnarič, Marjan Heričko,
... usage of security and the influences of JCE (Java Cryptography Extension) security providers on the performance of secured remote ...
Tópico(s): Distributed and Parallel Computing Systems
2005 - Elsevier BV | Journal of Systems and Software
... of security features using Java Cryptography Architecture (JCA), Java Cryptography Extension (JCE) and Java Secure Socket Extension (JSSE) API provided by Sun ...
Tópico(s): Security and Verification in Computing
2005 - Springer Science+Business Media | Lecture notes in computer science
Ying Cai, Ning Li, Chengxia Liu,
... The API is implemented by Java Cryptography Architecture, Java Cryptography Extension, Dom4j, and XPath technologies on Java platform and is confirmed to XML Digital Signature ...
Tópico(s): Power Systems and Technologies
2012 - Springer Science+Business Media | Lecture notes in computer science
Charles Okechukwu Ugwunna, P. E. Okimba, Orobosade Alabi, E. E. Orji, E. O. Olowofeso, S. O. Ayomide,
... It utilizes the Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE) to create an optimized runtime environment with advanced cryptographic libraries. The result indicate that Java's AES-128 implementation is more efficient than ...
Tópico(s): Advanced Data Storage Technologies
2024 - | FUDMA Journal of Sciences
Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto,
... cryptosystems (PBC) have been attracted by researchers in cryptography. Some implementations show that PBC are relatively slower than the standard public key cryptosystems. We present an efficient implementation for computing Tate pairing on a mobile phone using Java. We implemented the η T pairing (a recent efficient variation of Duursma-Lee algorithm) over some finite fields of characteristic 3 with extension degree m = { 97, 167, 193, 239 }. Our optimized ...
Tópico(s): Geometric and Algebraic Topology
2007 - Springer Science+Business Media | Lecture notes in computer science
... of the proposed approach using iFogSim simulator and Java Cryptography Architecture (JCA) library. The results show that the ...
Tópico(s): Cloud Data Security Solutions
2022 - Springer International Publishing | Lecture notes in networks and systems
... cryptographic algorithms RSA and ECC.The elliptic curve cryptography is implemented on smart card using Menezes-Vanstone Elliptic Curve Cryptosystem and Nyberg-Rueppel Signature Scheme [2].The implementation of these algorithms is done using Java Card technology.The test results are analysed and ...
Tópico(s): Cryptographic Implementations and Security
2012 - | International Journal of Advanced Information Technology
Ralf Küsters, Enrico Scapin, Tomasz Truderung, Jürgen Graf,
... noninterference properties but a priori cannot deal with cryptography to establish cryptographic indistinguishability properties, such as privacy properties, for Java programs. We refer to this framework as the ... To illustrate the usefulness and applicability of the extensions proposed in this paper, we apply the framework along with the tool Joana, which allows for the fully automatic verification of noninterference properties of Java programs, to establish cryptographic privacy properties of a ( ...
Tópico(s): Cloud Data Security Solutions
2014 - Springer Science+Business Media | Lecture notes in computer science

Juliana Kaizer Vizzotto, Bruno Crestani Calegaro,
... Java library for quantum programming. We use the extension of the programming language Java called BGGA Closure, that allow the manipulation of ...
Tópico(s): Quantum Information and
2015 - | Revista de Informática Teórica e Aplicada
Que Nguyet Tran Thi, Tran Khanh Dang,
... and fine grained. Besides, we also present an extension from the ABAC model for privacy protection with the approach of purpose usage. The notion of purpose is associated with levels of data disclosure and constraints to support more fine-grained privacy policies. A prototype built for the proposed model using Java and MongoDB has also presented in the paper. ...
Tópico(s):
2017 - Springer Science+Business Media | Lecture notes in computer science
... No. 3I2SD: Reverse Engineering Sequence Diagrams from Enterprise Java Beans with InterceptorsSerguei Roubtsov, Alexander Serebrenik, Aurelien Mazoyer ...
Tópico(s): Software System Performance and Reliability
1993 - | Series on software engineering and knowledge engineering
Chuyi Yan, Haixia Xu, Yongheng Mu, Jiong Ding,
... is the first SM9-IBS (Identity-based Signature) extension. Also, we prove its security is existentially unforgeable under adaptive chosen message and identity attacks (EUF-CMIA) in the standard model. At the same time, the implementation of our scheme using Java does not lead to an additional performance burden ...
Tópico(s): Complexity and Algorithms in Graphs
2022 - Springer Science+Business Media | Lecture notes in computer science
... especially for multi-application smart cards (e.g. Java cards) with an embedded 32-bit RISC core.
Tópico(s): Coding theory and
2003 - SAGE Publishing | The International Journal of High Performance Computing Applications
Simone Cirani, Gianluigi Ferrari, Marco Picone, Luca Veltri,
... Veltri, L. (2014) mjCoAP: An open-source lightweight Java CoAP library for Internet of Things applications, in ... R.M. and Wheeler, D.J. (1997) TEA Extensions, Tech. Rep., University of Cambridge. Standaert, F.X., ... ISO/IEC (2012) Information Technology – Security Techniques – Lightweight Cryptography – Part 2: Block Ciphers, ISO/IEC standard 29192- ... URL http://www.ieee.org. Standards for Efficient Cryptography Group. URL http://secs.org. National Institute of ...
Tópico(s): Opportunistic and Delay-Tolerant Networks
2018 - Springer Science+Business Media | Internet of things