dcsimg

Security

The Java architecture is very security concious. From the standard Java Cryptography Architecture (JCA) to the Java Crytography Extension (JCE) and beyond, you can build secure enterprise applications.   More>>

The Java architecture is very security concious. From the standard Java Cryptography Architecture (JCA) to the Java Crytography Extension (JCE) and beyond, you can build secure enterprise applications. [FAQ Previously managed by John Mitchell and Lennart Jorelid.]"   <<Less

SUBSCRIBE       NEW TOPIC
Results  71 to 80 of 1093  « Prev 1... 3 4 5 6 7 8 9 10 11 12 ... 110 Next » 
 
i have to encrypt the xml file using asymmetric cyper.... in one class , i am generating privat...
Tue 07/18/06
08:52:31AM
 
0
Tue 07/18/06
08:52:31AM
510
 
 
I have created a web application in that the cotent of the document should be non copyable.Please le...
Thu 07/13/06
05:21:11AM
 
1
Thu 07/13/06
04:54:44AM
451
 
 
I'm trying to use decodeSSOToken() in SiteMinder AgentAPI to decode the attributeList by via in-para...
Mon 07/10/06
02:54:50PM
 
0
Mon 07/10/06
02:54:50PM
889
 
 
Well, I have a private key generated by openssl and the certificate signed by our own CA. If I impor...
Thu 07/06/06
11:36:18PM
 
1
Tue 06/20/06
01:25:31PM
700
 
 
package XYZ contains A.class B.class C.class We packaged them in a jar. We created XYZ.jar and ...
Sun 06/25/06
02:40:50AM
 
2
Thu 06/15/06
12:42:09AM
731
 
 
 
How to identify a user in organisation to provide special previllages to give him. Is it done throw...
Wed 06/21/06
12:57:06AM
 
0
Wed 06/21/06
12:57:06AM
377
 
 
How to convert String to Bits? (please tell if any predefined function exits)
Sat 06/17/06
08:55:30AM
 
1
Sat 06/17/06
05:58:42AM
397
 
 
Hi, I have a Tomcat web application under development and I have a need to create 2 jsp code web...
Wed 06/07/06
09:26:01AM
 
0
Wed 06/07/06
09:26:01AM
500
 
 
Actually, I delevopment to client-side application to encrypt and desencrypt files but I want to kno...
Tue 05/30/06
08:36:04AM
 
0
Tue 05/30/06
08:36:04AM
414
 
 
how can i implement authentication for my java application using kerberos?
Sat 04/22/06
04:11:28AM
 
0
Sat 04/22/06
04:11:28AM
418
 
 
 
Results  71 to 80 of 1093  « Prev 1... 3 4 5 6 7 8 9 10 11 12 ... 110 Next » 
"Security" is moderated by Moderators:  SAdmin
About | Sitemap | Contact