咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 软件工程

主题

  • 3 篇 java cryptograph...
  • 3 篇 security
  • 1 篇 empirical study
  • 1 篇 symmetric encryp...
  • 1 篇 stackoverflow
  • 1 篇 authentication
  • 1 篇 near field commu...
  • 1 篇 chatgpt
  • 1 篇 mobile transacti...

机构

  • 1 篇 smith coll dept ...
  • 1 篇 amer univ middle...
  • 1 篇 univ paderborn p...
  • 1 篇 brunel univ lond...
  • 1 篇 tech univert cla...
  • 1 篇 univ bern scg be...

作者

  • 2 篇 ghafari mohammad
  • 1 篇 masri wassirn
  • 1 篇 firouzi ehsan
  • 1 篇 hazhirpasand moh...
  • 1 篇 nierstrasz oscar
  • 1 篇 bodden eric
  • 1 篇 krueger stefan
  • 1 篇 seker adi evren
  • 1 篇 ghinea gheorghit...
  • 1 篇 pourghomi pardis

语言

  • 2 篇 英文
  • 1 篇 其他
检索条件"主题词=Java cryptography"
3 条 记 录,以下是1-10 订阅
排序:
The Impact of Developer Experience in Using java cryptography  13
The Impact of Developer Experience in Using Java Cryptograph...
收藏 引用
13th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
作者: Hazhirpasand, Mohammadreza Ghafari, Mohammad Krueger, Stefan Bodden, Eric Nierstrasz, Oscar Univ Bern SCG Bern Switzerland Univ Paderborn Paderborn Germany
Background: Previous research has shown that crypto APIs are hard for developers to understand and difficult for them to use. They consequently rely on unvalidated boilerplate code from online resources where security... 详细信息
来源: 评论
Time to separate from StackOverflow and match with ChatGPT for encryption
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2024年 216卷
作者: Firouzi, Ehsan Ghafari, Mohammad Tech Univert Clausthal Clausthal Zellerfeld Germany
cryptography is known as a challenging topic for developers. We studied StackOverflow posts to identify the problems that developers encounter when using java cryptography Architecture (JCA) for symmetric encryption. ... 详细信息
来源: 评论
java Implementation of a Cloud-based SIM Secure Element NFC Payment Protocol
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2016年 第12期10卷 261-281页
作者: Pourghomi, Pardis Seker, Adi Evren Ghinea, Gheorghita Masri, Wassirn Amer Univ Middle East Dept Technol Egaila Kuwait Smith Coll Dept Comp Sci Northampton MA 01063 USA Brunel Univ London Dept Comp Sci Uxbridge Middx England
A number of security protocols have been designed for mobile transactions using Near Field Communication technology in the last few years. However, the component architectures of these protocols are rarely implemented... 详细信息
来源: 评论