Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - JCE
Search - JCE - List
DL : 0
介绍加密解密的书籍,对网络中的加密解密算法进行了详细的介绍-on encryption and decryption of books on the network encryption and decryption algorithms for a detailed account of
Update : 2008-10-13 Size : 471815 Publisher : 郑述庆

Getting started examples for the JCE and JCE provider installation.-Getting started examples for the JCE and JC E. provider installation.
Update : 2008-10-13 Size : 4823 Publisher : 刘永恒

DL : 1
数字证书注册和签发系统,利用JCA和JCE实现数字证书的注册,并提供一个密钥库管理以及私钥的存储和导出以及传输得安全机制
Update : 2008-10-13 Size : 95055 Publisher : ywd

DL : 0
sun s jce books,include all algrithm such as md5/ras sha tc
Update : 2008-10-13 Size : 440264 Publisher : fuchun.xia

DL : 0
ava加密扩展即Java Cryptography Extension,简称JCE。它是Sun的加密服务软件,包含了加密和密匙生成功能。JCE是JCA(Java Cryptography Architecture)的一种扩展。 JCE没有规定具体的加密算法,但提供了一个框架,加密算法的具体实现可以作为服务提供者加入。除了JCE框架之外,JCE软件包还包含了SunJCE服务提供者,其中包括许多有用的加密算法,比如DES(Data Encryption Standard)和Blowfish。 为简单计,在本文中我们将用DES算法加密和解密字节码。下面是用JCE加密和解密数据必须遵循的基本步骤: 步骤1:生成一个安全密匙。在加密或解密任何数据之前需要有一个密匙。密匙是随同被加密的应用一起发布的一小段数据,Listing 3显示了如何生成一个密匙。 【Listing 3:生成一个密匙】 -expansion that Java Cryptography Extension, referred to JCE. It is Sun's encryption software, including encryption and key generation functions. JCE is JCA (Java Cryptography Architecture), an extension. JCE no specific encryption algorithms, but provides a framework, the specific encryption algorithm can achieve as a service provider to join. Apart from the JCE framework, JCE package also includes SunJCE service providers, including many useful encryption algorithms such as DES (Data Encryption Standard) and the Blowfish. For simple terms, in this paper we will use DES encryption and decryption algorithms byte code. Below is JCE encryption and decryption of data must adhere to the basic steps : Step 1 : Generating a security keys. In any encryption or decryption of data is needed befo
Update : 2008-10-13 Size : 3197 Publisher : 肖俊

通过运用JCE中的des算法来实现对文本的加解密。
Update : 2009-05-17 Size : 597077 Publisher : yinjianliang220@126.com

DL : 0
ava加密扩展即Java Cryptography Extension,简称JCE。它是Sun的加密服务软件,包含了加密和密匙生成功能。JCE是JCA(Java Cryptography Architecture)的一种扩展。 JCE没有规定具体的加密算法,但提供了一个框架,加密算法的具体实现可以作为服务提供者加入。除了JCE框架之外,JCE软件包还包含了SunJCE服务提供者,其中包括许多有用的加密算法,比如DES(Data Encryption Standard)和Blowfish。 为简单计,在本文中我们将用DES算法加密和解密字节码。下面是用JCE加密和解密数据必须遵循的基本步骤: 步骤1:生成一个安全密匙。在加密或解密任何数据之前需要有一个密匙。密匙是随同被加密的应用一起发布的一小段数据,Listing 3显示了如何生成一个密匙。 【Listing 3:生成一个密匙】 -expansion that Java Cryptography Extension, referred to JCE. It is Sun's encryption software, including encryption and key generation functions. JCE is JCA (Java Cryptography Architecture), an extension. JCE no specific encryption algorithms, but provides a framework, the specific encryption algorithm can achieve as a service provider to join. Apart from the JCE framework, JCE package also includes SunJCE service providers, including many useful encryption algorithms such as DES (Data Encryption Standard) and the Blowfish. For simple terms, in this paper we will use DES encryption and decryption algorithms byte code. Below is JCE encryption and decryption of data must adhere to the basic steps : Step 1 : Generating a security keys. In any encryption or decryption of data is needed befo
Update : 2024-03-29 Size : 3072 Publisher : 肖俊

介绍加密解密的书籍,对网络中的加密解密算法进行了详细的介绍-on encryption and decryption of books on the network encryption and decryption algorithms for a detailed account of
Update : 2024-03-29 Size : 471040 Publisher : 郑述庆

Getting started examples for the JCE and JCE provider installation.-Getting started examples for the JCE and JC E. provider installation.
Update : 2024-03-29 Size : 4096 Publisher : 刘永恒

JSPjce
DL : 0
sun s jce books,include all algrithm such as md5/ras sha tc
Update : 2024-03-29 Size : 440320 Publisher : fuchun.xia

DL : 0
使用SUN JCE 1.6 的授权文件,按照里面的提示安装后就可正常使用SUN JCE 提供的安全编程功能。-JDK 1.6 "Unlimited Strength Jurisdiction Policy Files"
Update : 2024-03-29 Size : 9216 Publisher : letianfly

Java allows configuring multiple JCE providers, and looks up requested algorithms by name. This example shows generating RSA signatures with variable digests, and verification of the signed text by the means of RSA public key. An explanation of the example: 1. Class DataSigning reads the specified file, and creates its digest 2. A unique RSA key pair is created, and the public key is stored with ".key" extension 3. The digest of the text file is signed with the private key 4. During verification, the previously stored public key is retrieved from the file 5. The signature is read from the file 6. The signature is checked, using the public key and newly computed digest of the text
Update : 2024-03-29 Size : 3072 Publisher : neo

包含各種加密演算法和Digital Signatures(MD2 MD4 MD5 RIPEMD-128 RIPEMD-160 SHA-0 SHA-1 SHA-256 SHA-384 SHA-512 Tiger)-THIS SOFTWARE IS PROVIDED BY THE CRYPTIX FOUNDATION LIMITED ``AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Update : 2024-03-29 Size : 936960 Publisher : 陳盈

DL : 0
JCE加密,来源于JAVA Cryptgraph的源码,经过调试和改进。陆续上传当中-from JCE security and java cryptgraph code, I m improving it and uploading!
Update : 2024-03-29 Size : 27648 Publisher : wangzhongliang

DL : 0
While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Update : 2024-03-29 Size : 2560000 Publisher : bk

DL : 0
JCE编辑器 php系统可用,joomla可用-Available to the system JCE editor php, joomla available
Update : 2024-03-29 Size : 813056 Publisher : 张星星

DL : 0
JCE的jar,密钥分配,技术的特点和基础-JCE jar, this is some key assignment.
Update : 2024-03-29 Size : 471040 Publisher : d

DL : 0
jce 1.5.zip for down resorce
Update : 2024-03-29 Size : 6144 Publisher : lanneret98

DL : 0
在JCE平台上验证AES算法,计算机安全与保密作业,Java算法-Verification of AES algorithm on JCE platform
Update : 2024-03-29 Size : 1024 Publisher : 陈洁

DL : 0
在JCE平台上验证RSA算法,计算机安全与保密作业,Java算法-Verification of RSA algorithm on JCE platform
Update : 2024-03-29 Size : 1024 Publisher : 陈洁
« 12 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.