Station-to-Station authentication key exchange protocol.
-
Updated
Jan 12, 2021 - Java
Station-to-Station authentication key exchange protocol.
🐧 The Linux Simulator
AES algorithm implementation in Java
针对Java Web的RASP(Runtime application self-protection )漏洞防护系统。
Skills and knowledge required to be a successful security engineer in transaction security research.
Simulation of SDA (offline static data authentication) and DDA (dynamic data authentication)
This repository is intended for the java encryption with the use of AES algorithm..
Encryption And Decryption Using Different Symmetric And Asymmetric Algorithms.
Even the Cat Can be Undefeated
It includes code to encrypt message into cipher and again decrypt that cipher to original text using pocket AES.
University(SevGU) projects. Several encryption algorithms implementations
Data concealing in vector images
Cryptography Android application code samples / cipher collection for app users
An android application where you can record the following account information: username, platform, passwords to an offline database.
An implementation of a Take-Grant protection model, which is a formal model used in the computer security field.
This is an all-one cryptosystem dump where you can find all the programs as per cybersecurity.
basic algorithms implemented during my university study
Disciplina cursada no meu quarto e último ano de formação no Instituto Federal Sul-rio-grandense (2022), onde aprendi como cifrar e decifrar, alguns tipos de criptografias.
Repository for the project in an information security course
Add a description, image, and links to the information-security topic page so that developers can more easily learn about it.
To associate your repository with the information-security topic, visit your repo's landing page and select "manage topics."