The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1
The topics covered in this article are the risks that must be taken into account when developing the...
Artykuł poświęcony jest analizie szyfrowanych zapisek w diariuszu należącym do poznańskiego kanonika...
. This article presents the methods of enhancing the performance and security of web applications. I...
The data is often the most valuable thing that we collect on our computers. Without proper data secu...
Application security is one of the key aspects necessary for its proper functioning. Ensuring securi...
The article presents the results of analysis of the distributed registry technology called blockchai...
The subject of this article is to compare iOS mobile operation system encryption algorithms performa...
Mostly when word encrypted occurs in an article text, another word decryption comes along. However n...
Przedmiotem rozprawy doktorskiej są zagadnienia związane z prawnymi i technicznymi aspektami zabezpi...
This article presents one of the mechanisms of ensuring security in applications designed in Java pr...
The article describes various protection methods of database and types of SQL Injection attacks. The...
Najpopularnija metoda autentikacije korisnika u informacijskim sustavima jest primjena lozinki...
The article discusses the issue of the security of Internet applications. The most popular types of ...
This article presents an analysis of the ciphering system used in the a daily record of news and eve...
This article is about web application security. Describes the most common types of web attacks. The ...
The topics covered in this article are the risks that must be taken into account when developing the...
Artykuł poświęcony jest analizie szyfrowanych zapisek w diariuszu należącym do poznańskiego kanonika...
. This article presents the methods of enhancing the performance and security of web applications. I...
The data is often the most valuable thing that we collect on our computers. Without proper data secu...
Application security is one of the key aspects necessary for its proper functioning. Ensuring securi...
The article presents the results of analysis of the distributed registry technology called blockchai...
The subject of this article is to compare iOS mobile operation system encryption algorithms performa...
Mostly when word encrypted occurs in an article text, another word decryption comes along. However n...
Przedmiotem rozprawy doktorskiej są zagadnienia związane z prawnymi i technicznymi aspektami zabezpi...
This article presents one of the mechanisms of ensuring security in applications designed in Java pr...
The article describes various protection methods of database and types of SQL Injection attacks. The...
Najpopularnija metoda autentikacije korisnika u informacijskim sustavima jest primjena lozinki...
The article discusses the issue of the security of Internet applications. The most popular types of ...
This article presents an analysis of the ciphering system used in the a daily record of news and eve...
This article is about web application security. Describes the most common types of web attacks. The ...
The topics covered in this article are the risks that must be taken into account when developing the...
Artykuł poświęcony jest analizie szyfrowanych zapisek w diariuszu należącym do poznańskiego kanonika...
. This article presents the methods of enhancing the performance and security of web applications. I...