DDF :: Security :: Encryption :: App

LicenseLGPL 3.0
Tagssecuritycryptography
Ranking#890799 in MvnRepository (See Top Artifacts)

VersionVulnerabilitiesRepositoryUsagesDate
2.2.x
2.2.2Codice Releases
0
Oct 08, 2013
2.2.1Codice Releases
0
Sep 11, 2013
2.2.0Codice Releases
0
Aug 20, 2013
2.2.0.RC5Codice Releases
0
Aug 06, 2013
2.2.0.RC4Codice Releases
0
Jul 17, 2013
2.2.0.RC3Codice Releases
0
Jul 05, 2013
2.2.0.RC2Codice Releases
0
Jun 04, 2013
2.2.0.RC1Codice Releases
0
May 14, 2013

Related Books

Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition)Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025)
by Snoke, Nancy
Cryptography (The MIT Press Essential Knowledge series)Cryptography (The MIT Press Essential Knowledge series) (2024)
by Louridas, Panos
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern EncryptionSerious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption (2024)
by Aumasson, Jean-Philippe
Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum CryptographyCryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography (2024)
by Bertaccini, Massimo
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum AlgorithmsUnderstanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (2024)
by Paar, Christof, Pelzl, Jan, Güneysu, Tim
Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition)Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024)
by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and MoreThe Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022)
by Tijms, Arjan, Bais, Teo, Keil, Werner
Real-World CryptographyReal-World Cryptography (2021)
by Wong, David
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital EncryptionThe Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption (2018)
by Holden, Joshua
Serious Cryptography: A Practical Introduction to Modern EncryptionSerious Cryptography: A Practical Introduction to Modern Encryption (2017)
by Aumasson, Jean-Philippe
Understanding Cryptography: A Textbook for Students and PractitionersUnderstanding Cryptography: A Textbook for Students and Practitioners (2014)
by Paar, Christof, Pelzl, Jan, Preneel, Bart
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) (2014)
by Hoffstein, Jeffrey, Pipher, Jill, Silverman, Joseph H.
Break the Code: Cryptography for Beginners (Dover Kids Activity Books)Break the Code: Cryptography for Beginners (Dover Kids Activity Books) (2013)
by Johnson, Bud
Java Security (2nd Edition)Java Security (2nd Edition) (2001)
by Oaks, Scott
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum CryptographyThe Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (2000)
by Singh, Simon