Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,693,487 papers from all fields of science
Search
Sign In
Create Free Account
Bouncy Castle
Known as:
Legion of the Bouncy Castle Inc.
, Bouncy Castle (software)
, Bouncy castle (cryptography API)
Expand
Bouncy Castle is a collection of APIs used in cryptography. It includes APIs for both the Java and the C# programming languages. The APIs are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Android
Android Privacy Guard
Apache Harmony
Application programming interface
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Randomly Failed! The State of Randomness in Current Java Implementations
K. Michaelis
,
Christopher Meyer
,
Jörg Schwenk
The Cryptographer's Track at RSA Conference
2013
Corpus ID: 10103048
This paper investigates the Randomness of several Java Runtime Libraries by inspecting the integrated Pseudo Random Number…
Expand
2008
2008
Transaction Oriented Text Messaging with Trusted-SMS
A. Grillo
,
Alessandro Lentini
,
G. Me
,
G. Italiano
Asia-Pacific Computer Systems Architecture…
2008
Corpus ID: 2671392
The exponential growth of the Short Message Service(SMS) use has led this service to a widespread tool for social, marketing and…
Expand
Highly Cited
2005
Highly Cited
2005
Abstraction, Reformulation and Approximation, 6th International Symposium, SARA 2005, Airth Castle, Scotland, UK, July 26-29, 2005, Proceedings
Sara
,
Jean-Daniel Zucker
,
L. Saitta
Symposium on Abstraction, Reformulation and…
2005
Corpus ID: 33825026
Full Papers.- Verifying the Incorrectness of Programs and Automata.- Generating Admissible Heuristics by Abstraction for Search…
Expand
2005
2005
Marker-free Automatic Matching of Range Data
Rui Liu
,
G. Hirzinger
2005
Corpus ID: 16917445
Matching of multiple views is often addressed in 3D-model generation and is normally a two-stage process consisting of a coarse…
Expand
2004
2004
3D game engine architecture - engineering real-time applications with wild magic
D. Eberly
The Morgan Kaufmann series in interactive 3D…
2004
Corpus ID: 59778950
* About the Author* Preface*Chapter 1 Introduction*1.1 Drawing a Triangle*1.2 Drawing a Triangle Mesh*1.3 Drawing a Complicated…
Expand
1999
1999
Nutrient control of bacterioplankton and phytoplankton dynamics
M. Brett
,
F. S. Lubnow
,
M. Villar‐Argaiz
,
Anke B. Müller-Solger
,
C. Goldman
Aquatic Ecology
1999
Corpus ID: 9014280
To determine whether positive correlations between phytoplankton and bacterioplankton growth in nutrient addition experiments are…
Expand
1979
1979
Stages of infection and ecological effects of a fungal epidemic on the eggs of a limnetic copepod
G. Redfield
,
W. Vincent
1979
Corpus ID: 54203864
SUMMARY. Fungal infection of calanoid copepod (Diaptomus novamexicanus) eggs was observed in each of three years in an alpine…
Expand
Highly Cited
1971
Highly Cited
1971
Excavations at Portchester Castle
B. Cunliffe
1971
Corpus ID: 160579597
1963
1963
Herbert correspondence : the sixteenth and seventeenth century letters of the Herberts of Chirbury, Powis Castle and Dolguog, formerly at Powis Castle in Montgomeryshire
W. J. Smith
1963
Corpus ID: 160174319
1960
1960
The building accounts of Tattershall Castle, 1434-1472
W. Simpson
1960
Corpus ID: 131299398
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE