Station-to-Station authentication key exchange protocol.
-
Updated
Jan 12, 2021 - Java
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Station-to-Station authentication key exchange protocol.
针对Java Web的RASP(Runtime application self-protection )漏洞防护系统。
🐧 The Linux Simulator
AES algorithm implementation in Java
Skills and knowledge required to be a successful security engineer in transaction security research.
Simulation of SDA (offline static data authentication) and DDA (dynamic data authentication)
This repository is intended for the java encryption with the use of AES algorithm..
Encryption And Decryption Using Different Symmetric And Asymmetric Algorithms.
Even the Cat Can be Undefeated
"Password Vault" - A project as part of a course for running code in a secure environment. JCT.
It includes code to encrypt message into cipher and again decrypt that cipher to original text using pocket AES.
University(SevGU) projects. Several encryption algorithms implementations
Data concealing in vector images
Cryptography Android application code samples / cipher collection for app users
An android application where you can record the following account information: username, platform, passwords to an offline database.
Implementation of some of the cryptography algorithms in Java.
This is an all-one cryptosystem dump where you can find all the programs as per cybersecurity.
basic algorithms implemented during my university study
Disciplina cursada no meu quarto e último ano de formação no Instituto Federal Sul-rio-grandense (2022), onde aprendi como cifrar e decifrar, alguns tipos de criptografias.
Created by The cybersecurity community