dcsimg

Security

The Java architecture is very security concious. From the standard Java Cryptography Architecture (JCA) to the Java Crytography Extension (JCE) and beyond, you can build secure enterprise applications.   More>>

The Java architecture is very security concious. From the standard Java Cryptography Architecture (JCA) to the Java Crytography Extension (JCE) and beyond, you can build secure enterprise applications. [FAQ Previously managed by John Mitchell and Lennart Jorelid.]"   <<Less

SUBSCRIBE       NEW TOPIC
Results  71 to 80 of 1093  « Prev 1... 3 4 5 6 7 8 9 10 11 12 ... 110 Next » 
 
i have to encrypt the xml file using asymmetric cyper.... in one class , i am generating privat...
Tue 07/18/06
08:52:31AM
 
0
Tue 07/18/06
08:52:31AM
410
 
 
I have created a web application in that the cotent of the document should be non copyable.Please le...
Thu 07/13/06
05:21:11AM
 
1
Thu 07/13/06
04:54:44AM
390
 
 
I'm trying to use decodeSSOToken() in SiteMinder AgentAPI to decode the attributeList by via in-para...
Mon 07/10/06
02:54:50PM
 
0
Mon 07/10/06
02:54:50PM
778
 
 
Well, I have a private key generated by openssl and the certificate signed by our own CA. If I impor...
Thu 07/06/06
11:36:18PM
 
1
Tue 06/20/06
01:25:31PM
594
 
 
package XYZ contains A.class B.class C.class We packaged them in a jar. We created XYZ.jar and ...
Sun 06/25/06
02:40:50AM
 
2
Thu 06/15/06
12:42:09AM
639
 
 
 
How to identify a user in organisation to provide special previllages to give him. Is it done throw...
Wed 06/21/06
12:57:06AM
 
0
Wed 06/21/06
12:57:06AM
332
 
 
How to convert String to Bits? (please tell if any predefined function exits)
Sat 06/17/06
08:55:30AM
 
1
Sat 06/17/06
05:58:42AM
352
 
 
Hi, I have a Tomcat web application under development and I have a need to create 2 jsp code web...
Wed 06/07/06
09:26:01AM
 
0
Wed 06/07/06
09:26:01AM
422
 
 
Actually, I delevopment to client-side application to encrypt and desencrypt files but I want to kno...
Tue 05/30/06
08:36:04AM
 
0
Tue 05/30/06
08:36:04AM
368
 
 
how can i implement authentication for my java application using kerberos?
Sat 04/22/06
04:11:28AM
 
0
Sat 04/22/06
04:11:28AM
361
 
 
 
Results  71 to 80 of 1093  « Prev 1... 3 4 5 6 7 8 9 10 11 12 ... 110 Next » 
"Security" is moderated by Moderators:  SAdmin
About | Sitemap | Contact