Station-to-Station authentication key exchange protocol.
-
Updated
Jan 12, 2021 - Java
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Station-to-Station authentication key exchange protocol.
AES algorithm implementation in Java
🐧 The Linux Simulator
Encryption And Decryption Using Different Symmetric And Asymmetric Algorithms.
網站程式資安白箱與黑箱檢測處理經驗分享-漏洞修補範例程式
Implementation of some of the cryptography algorithms in Java.
Simulation of SDA (offline static data authentication) and DDA (dynamic data authentication)
针对Java Web的RASP(Runtime application self-protection )漏洞防护系统。
Even the Cat Can be Undefeated
Repository for the project in an information security course
Encrypt and protect sensitive data with Format Preserving Encryption (FPE) using the FF3 algorithm with DES. A secure Java-based solution that maintains data format integrity. Explore FPE-FF3-DES-Encryption for robust information security. 🛡️🔐🚀
This is an all-one cryptosystem dump where you can find all the programs as per cybersecurity.
basic algorithms implemented during my university study
Disciplina cursada no meu quarto e último ano de formação no Instituto Federal Sul-rio-grandense (2022), onde aprendi como cifrar e decifrar, alguns tipos de criptografias.
Implementation of checking algorithm for the can_write predicate in an arbitrary Take-Grant model
Java Encryptor and Decryptor project. This code sample enables secure data encryption for confidentiality and seamless decryption for accessibility.
Skills and knowledge required to be a successful security engineer in transaction security research.
This is a training repository for an information security course
This repository is intended for the java encryption with the use of AES algorithm..
Created by The cybersecurity community