Welcome![Sign In][Sign Up]
Location:
Search - encryption application in java

Search list

[Crack HackjavaCrypt

Description: 自己写的java版的加密解密网络算法应用。有对称,非对称,数字签名,等应用-himself wrote the java version of the network encryption and decryption algorithm application. A symmetric, asymmetric, digital signature, and other applications
Platform: | Size: 297984 | Author: jimmyzyp | Hits:

[JSP/Java2005091210190622145

Description: 自己写的java版的加密解密网络算法应用。有对称,非对称,数字签名,等功能~-himself wrote the java version of the network encryption and decryption algorithm application. A symmetric, asymmetric, digital signatures, and other functions ~
Platform: | Size: 6144 | Author: totti | Hits:

[Crack HackSetSec

Description: 一个运用J2ME的编程技术在手机里实现了加密与解密的经典算法,-a J2ME application programming technology in mobile phones achieved the encryption and decryption of the classic algorithms,
Platform: | Size: 8192 | Author: 李倩 | Hits:

[ELanguageJava.ZIP

Description: Java中常用的加密算法应用就这些!!还是要好好的看到的!-Java encryption algorithm commonly used in the application on these!! Still good to see!
Platform: | Size: 29696 | Author: 苏刚 | Hits:

[JSP/JavaDESPlus

Description: java des加密解密里面有详细的应用例子-java des encryption and decryption which a detailed application examples
Platform: | Size: 2048 | Author: sunzhibin | Hits:

[JSP/JavaJava_wenjianbaohu

Description: 编译后的Java类文件很容易被反编译,在Java应用上会产生源代码的安全问题。该文对传统的Java类文件保护方法进行分析,在类加载器(ClassLoader)加密技术的基础上,提出一种使用JNI技术调用本地解密接13的改进方法。解密接口在设计上保证了JNI技术调用本地解密接口时的通信安全,从而提升了Java类文件的安全性。实验结果表明,该方法是有效的。-Compiled Java class files can easily be decompiled, in the Java application will produce the source code security issues. In this paper, the traditional method of Java class file protection analysis in the class loader (ClassLoader) encryption technology, based on the use of JNI technology presents a call to a local pick 13 of the improved method decryption. Decryption interface is designed to ensure the JNI interface technology, called a local decryption of communications security, thus enhancing the security of Java class files. The experimental results show that the method is effective.
Platform: | Size: 1071104 | Author: 刘杰 | Hits:

[Crack Hackkt

Description: 实现骑士游历问题。 骑士游历问题是一个经典的数学问题。其思想在电路图的设计及图像加密等方面都有帮助,如果能将骑士游历问题算法通过计算机语言程序化将对其在其他领域中的应用有极大帮助。通过研究骑士游历的规则对问题进行数学模型抽象,通过研究骑士游历的方向与可到达情况,将骑士的空间移动抽象成数学表达式,进而映射到程序中所需对应的数据结构形式,最后通过利用JAVA语言得以实现骑士游历问题中骑士游历过程的动态图形演示。 -Knight traveled to achieve the problem. Knights tour problem is a classical mathematical problem. Their thoughts on the schematic design and image encryption and other aspects to help, if the knight can travel through a computer algorithm for the problem of the language program in its application in other areas of great help. Knight traveled by studying the rules of abstract mathematical models of problems, Knight traveled by studying the direction and the situation can be reached, the Knights of room to move into the abstract mathematical expressions, and then mapped to the corresponding program data structures required in the form of final adoption can be achieved using JAVA language issues knight knights traveled traveled the process of dynamic graphical presentation.
Platform: | Size: 4096 | Author: 蒋立 | Hits:

[Software EngineeringJava-software-protection-technology

Description: 用加密的方法来保护Java类文件,加密可以有效地对抗反编译 Java技术在设计之初就考虑到应用环境的复杂性,因此允许用户根据Java规范定制类加载器,使用这些定制的Classloader可以完成特定的操 作,比如从网络上下载类文件,验证类文件来源等,本文定制了 北京邮电大学硕日毋究生学位论文Java软件保护技术研究及实现一个Classloader来完成加密类文件的加载" (3)负责密钥提取和解密的具体算法不能被加密,否则又需要先将它 们解密,由此将形成一个循环,而它们又是必须要加以保护的核 心内容,本方案中,将它们用C++实现并编译为本地的动态链接 库文件,这样可以有效地抵抗反编译 -Encryption method used to protect Java class files, encryption can be effective against decompile Java technology early in the design to take into account the complexity of the application environment, thus allowing users to customize the Java class loader specification, use these custom Classloader can be completed specific actions, such as class files downloaded from the Internet, verify that the class file sources, Beijing University of Posts and customized paper at no postgraduate Master Thesis Java software protection technology research and implement a Classloader to complete the encryption class file loaded " (3 ) is responsible for extracting and decrypting key specific algorithm can not be encrypted, or they need to first decrypt them, thereby forming a loop, and that they must be taken to protect the core, this scenario, they are implemented using C++ and compiled to native dynamic link library file, which can effectively resist decompile
Platform: | Size: 1024 | Author: 李忠楠 | Hits:

[JSP/JavaCasar-encryption-decrypt-application

Description: 经典的凯撒加密解密算法,用java实现,可移植性强,欢迎各位童鞋指正交流-Classic Caesar encryption and decryption algorithms, implemented in java, portability, welcome correction exchanges shoes
Platform: | Size: 1024 | Author: Ami | Hits:

[Other《Java加密与解密的艺术》.(梁栋).[PDF]&ckook

Description: 《Java加密与解密的艺术》是2010年机械工业出版社出版的图书,作者是梁栋。本书讲解了加密技术对数字证书和SSL/TLS协议的应用,又以示例的方式讲解了加密与解密技术在网络中的实际应用。[1]("The art of encryption and decryption of Java" is a book published by the machinery industry press in 2010. The author is Liang Dong. This book explains the application of encryption technology to digital certificates and SSL/TLS protocols, and explains the practical application of encryption and decryption technology in the network in an example. [1])
Platform: | Size: 45978624 | Author: dispa1r | Hits:

CodeBus www.codebus.net