DDF Security Encryption

LicenseLGPL 3.0
Tagspomsecuritycryptography
Ranking#803831 in MvnRepository (See Top Artifacts)

VersionVulnerabilitiesRepositoryUsagesDate
2.29.x
2.29.15Codice Releases
0
Mar 20, 2025
2.29.14Codice Releases
0
Mar 19, 2025
2.29.13Codice Releases
0
Mar 14, 2025
2.29.12Codice Releases
0
Mar 14, 2025
2.29.11Codice Releases
0
Mar 13, 2025
2.29.10Codice Releases
0
Mar 13, 2025
2.29.9.2Codice Releases
0
Apr 03, 2025
2.29.9.1Codice Releases
0
Mar 27, 2025
2.29.9Codice Releases
0
Mar 07, 2025
2.29.8Codice Releases
0
Mar 04, 2025
2.29.7Codice Releases
0
Feb 21, 2025
2.29.6Codice Releases
0
Feb 19, 2025
2.29.5Codice Releases
0
Feb 13, 2025
2.29.4Codice Releases
0
Jan 24, 2025
2.29.3Codice Releases
0
Jan 08, 2025
2.29.2Codice Releases
0
Dec 02, 2024
2.29.1Codice Releases
0
Aug 26, 2024
2.29.0Codice Releases
0
Feb 15, 2023
2.28.x
2.28.0Codice Releases
0
Jan 14, 2022
2.27.x
2.27.1Codice Releases
0
Aug 04, 2021

Related Books

Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition)Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025)
by Snoke, Nancy
Cryptography (The MIT Press Essential Knowledge series)Cryptography (The MIT Press Essential Knowledge series) (2024)
by Louridas, Panos
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern EncryptionSerious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption (2024)
by Aumasson, Jean-Philippe
Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum CryptographyCryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography (2024)
by Bertaccini, Massimo
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum AlgorithmsUnderstanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (2024)
by Paar, Christof, Pelzl, Jan, Güneysu, Tim
Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition)Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024)
by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and MoreThe Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022)
by Tijms, Arjan, Bais, Teo, Keil, Werner
Real-World CryptographyReal-World Cryptography (2021)
by Wong, David
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital EncryptionThe Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption (2018)
by Holden, Joshua
Serious Cryptography: A Practical Introduction to Modern EncryptionSerious Cryptography: A Practical Introduction to Modern Encryption (2017)
by Aumasson, Jean-Philippe
Understanding Cryptography: A Textbook for Students and PractitionersUnderstanding Cryptography: A Textbook for Students and Practitioners (2014)
by Paar, Christof, Pelzl, Jan, Preneel, Bart
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) (2014)
by Hoffstein, Jeffrey, Pipher, Jill, Silverman, Joseph H.
Break the Code: Cryptography for Beginners (Dover Kids Activity Books)Break the Code: Cryptography for Beginners (Dover Kids Activity Books) (2013)
by Johnson, Bud
Java Security (2nd Edition)Java Security (2nd Edition) (2001)
by Oaks, Scott
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum CryptographyThe Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (2000)
by Singh, Simon