Java security

Results: 406



#Item
41Public-key cryptography / Key management / Computer access control / Transport Layer Security / Public key infrastructure / Certificate authority / Smart card / Java / Multi-factor authentication / Authentication / Man-in-the-browser / Public key certificate

PDF Document

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
42Java platform / Computing platforms / Cross-platform software / Java / Hacking / Java security / Java Web Start / Sandbox / Vulnerability / Computer security / Android / Malware

Evaluating the Flexibility of the Java Sandbox Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, and Joshua Sunshine Carnegie Mellon University {zfc,mmaass}@cs.cmu.edu, , {clegoues,sunshine}@cs.cmu.

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2015-11-22 13:12:13
43Cross-platform software / Optimizely / Functional languages / Scripting languages / Concurrent programming languages / Object-oriented programming languages / JavaScript / Security token / Experiment / Java

Optimizely Headline Testing Technical Implementation Guide 631 HOWARD ST. #100 SAN FRANCISCO, CA 94105

Add to Reading List

Source URL: blog.optimizely.com

Language: English - Date: 2015-05-20 18:31:10
44Computer access control / Access control / Identity management / Authentication / Notary / Packaging / Authorization / Password / User / Java Authentication and Authorization Service

Hudson Security Architecture Winston Prakash

Add to Reading List

Source URL: hudson-ci.org

Language: English - Date: 2012-02-24 08:32:09
45Computer security / Cross-platform software / Scripting languages / Computing platforms / Java platform / HDIV / JavaScript / Vulnerability / Cross-site request forgery / Java / Adobe ColdFusion / Application security

Enterprise Security API (ESAPI) Java Java User Group – San Antonio Jarret Raim June 3rd, 2010

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:19:01
46

Press Release Paris, Thursday 21st January 2016 Cryptosense Announces Availability of Java Crypto Analysis Tool Cryptosense SA has released a new tool for identifying cryptographic security weaknesses in Java application

Add to Reading List

Source URL: cryptosense.com

Language: English - Date: 2016-01-29 11:19:24
    47Android / Smartphones / Alphabet Inc. / Google Play / Personal /  Inc. / Java / Here

    FraunhoFer InstItute F o r a p p l I e d a n d I n t e g r at e d s e c u r I t y AppRAy: UseRdRiven And fUlly AUtomAted AndRoid App secURity Assessment

    Add to Reading List

    Source URL: www.aisec.fraunhofer.de

    Language: English - Date: 2016-01-07 02:48:57
    48

    Java Application Crypto Analysis Cryptography is the essential enabling security technology of modern business networks. However, crypto is also complex and fragile, and often a source of vulnerabilities. Key Features

    Add to Reading List

    Source URL: cryptosense.com

    Language: English - Date: 2016-03-16 10:35:37
      49Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

      Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

      Add to Reading List

      Source URL: www.bouncycastle.org

      Language: English - Date: 2016-04-29 19:57:45
      50Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

      Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

      Add to Reading List

      Source URL: bouncycastle.org

      Language: English
      UPDATE