Search Results for "encryption algorithm java" - Page 12

Showing 1080 open source projects for "encryption algorithm java"

View related business solutions
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1

    CrypSten

    A Hybrid Cryptosystem with Steganography DLL

    A library written in Visual C# for encrypting a text message into an image file, and decrypting an image file to get the text message using Rijndael Algorithm, RSA Algorithm, and LSB Substitution Algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A P2P overlay construction toolkit, which supports routing algorithm researchers in addition to application developers. It provides multiple routing (DHT) algorithms such as Chord, Kademlia, Koorde, Pastry and Tapestry, and a distributed environment emu
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Open Simplex Project

    Open Simplex Project

    A Simple GUI Implementation of the Simplex Algorithm

    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud SQL for MySQL, PostgreSQL, and SQL Server Icon
    Cloud SQL for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Fully managed, cost-effective relational database service for PostgreSQL, MySQL, and SQL Server. Try Enterprise Plus edition for a 99.99% availability SLA and category-leading performance.
    Try it for free
  • 5
    Look at the official GitHub: https://github.com/JasperBarzilaij/Encryption-Program
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    DE-HEoC

    DE-based Weight Optimisation for Heterogeneous Ensemble

    We propose the use of Differential Evolution algorithm for the weight adjustment of base classifiers used in weighted voting heterogeneous ensemble of classifier. Average Matthews Correlation Coefficient (MCC) score, calculated over 10-fold cross-validation, has been used as the measure of quality of an ensemble. DE/rand/1/bin algorithm has been utilised to maximize the average MCC score calculated using 10-fold cross-validation on training dataset. The voting weights of base classifiers...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    jPass - Cross-Platform Password Manager

    jPass - Cross-Platform Password Manager

    Compiled into a single .jar file. Tiny Password Manager. Portable

    I did not see a pre-built version of this software on the original developers Github project (https://github.com/gaborbata/jpass), so I am taking it upon myself to compile the releases as they come, so that others don't have to. --Description-- JPass is a simple, small, portable password manager application with strong encryption. It allows you to store user names, passwords, URLs and generic notes in an encrypted file protected by one master password. I will not add the source here...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    TreeLayout

    TreeLayout

    Efficient and customizable TreeLayout Algorithm in Java, for NetBeans

    Efficiently create compact, highly customizable tree layouts - Based on Walker's algorithm with enhancements suggested by Buchheim, Jünger, and Leipert the software builds tree layouts in linear time. I.e. even trees with many nodes are built fast. Downloads are available at https://sourceforge.net/projects/treelayout/files/. For detailed documentation look at the TreeLayout web site http://treelayout.sourceforge.net/. Development for TreeLayout has moved to https://github.com/abego...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    cvault

    credentials vaulting solution for U*IX & Posix systems

    Credentials vaulting solution that allows any (authorized) user to retrieve any resource protected credentials. This solution prevents any hard-coding login informations in clear in scripts/programs. Based upon distribution center daemon associated with standard Opensource database back-end and end-to-end encryption. Manageable through lightweight java application beside U*IX CLI utilities as well. Fully new revamp of the previously "nprds" project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights. Click to perfect your product now.
    Click to perfect your product now.
  • 10
    LDWM: Hash-Based Signatures (draft-mcgrew-hash-sigs-02), PHP implementation of IETF pqcrypto algorithm specification
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    DXE Encryption Algorithm

    DXE (Darkgust's Xor Encoder) is an encryption algorithm made in VB.NET

    DXE (Darkgust's Xor Encoder) is an encryption algorithm made in Visual Basic .NET .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Areca Backup
    Areca-Backup is a file backup software that supports incremental, image and delta backup on local drives or FTP servers. Areca-Backup also allows you to browse your backups and navigate among different version of the files contained in your archives.
    Leader badge
    Downloads: 166 This Week
    Last Update:
    See Project
  • 13

    GeneticAlgorithms

    Framework for using the Genetic Algorithms optimization heuristic.

    GeneticAlgorithms is a simple and lightweight framework to implement an optimization heuristic following the Genetic Algorithms model. A genetic algorithm mimics the natural processes of evolution, selection and "survival of the fittest". This framework is intuitive and good integrated with Java 1.5 SDK and later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    CliqueSquare

    CliqueSquare

    Distributed RDF Processing over Hadoop

    CliqueSquare is a system for storing and querying large RDF graphs relying on Hadoop’s distributed file system (HDFS) and Hadoop’s MapReduce open-source implementation. It provides a novel partitioning and storage scheme that permits 1-level joins to be evaluated locally using efficient map-only joins. In addition, CliqueSquare is equipped with a unique optimization algorithm based on graphs and cliques capable of generating highly parallelizable flat query plans relying on n-ary equality joins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    video encryption

    video encryption

    Light video encryption technique (source code)

    Light encryption algorithm (technique) that can be used in real time video encryption. (source code has been uploaded; You can read attached pdf file for more details about the presented encryption technique ! )
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    JAABA

    The Janelia Automated Animal Behavior Annotator

    ... detectors that can then be used to automatically classify the behaviors of animals in large data sets with high throughput. JAABA combines an intuitive graphical user interface, a fast and powerful machine learning algorithm, and visualizations of the classifier into an interactive, usable system for creating automatic behavior detectors. Documentation is available at: http://jaaba.sourceforge.net/
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 17

    NCrypted

    NCrypted - simple file encryption software with GPU support

    NCrypted is a simple file encryption software. It is implemented on top of AES 128-bit algorithm. This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SSH System Administration Tool

    SSH System Administration Tool

    SSH Java client GUI for Unix, Linux administration and monitoring

    Raanan Zion https://au.linkedin.com/pub/raanan-zion/88/7b9/255 ssh Java interface for Unix, Linux and MS Windows system administration and monitoring. Automates firewall rule checks; exporting the results into Excel. Allows you to run multiple Unix commands on multiple servers simultaneously. Captures your network traces (on the port/ports and interface/interfaces of your choice) and at at a click of a button copies them back to your desktop opening. Remotely monitor your servers in a real...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Enigma_3

    A substitution-based encryption algorithm for binary data or text

    Enigma3 is a substitution-based encryption algorithm that can be applied to binary or text data and results in far greater security than traditional encryption. An electronic dictionary of words is employed and numeric codes are then assigned to each word within the dictionary. Communications are coded as a set of numeric codes which can then only be translated back into the original message by using the original coded dictionary. This is not an encryption method in the commonly accepted...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    GDLOG

    Implementation of the GNFS for discrete logarithm problem in GF(p)

    GDLOG is an implementation of the General Number Field Sieve algorithm for discrete logarithm problem in GF(p).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Chemin Optimal

    Chemin Optimal

    allow to Find the optimal path using FORD algorithm

    Chemin optimal allows to draw nodes on a scene and link them with Arcs. You can affect values to each arc (the path's length). By clicking the launch button, chemin optimal show you the optimal path of the graphs using FORD algorithm. All operations are shown step by step. You can export the scene to a XML file. You can also load scene freom existing XML file. Chemin optimal check errors automatically before finding the minimal path. Chemin optimal is written in JAVA( JAVAFX ).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Text Encryption and Decryption

    Text Encryption and Decryption

    Anoncrypt-Text Encryption and Decryption Website in Java(Struts2)

    Anoncrypt by HTCoders is a web based Text Encryption and Decryption Project using Java Technology following Struts2 Framwork . It Consist of two modules > Password based Encryption (Symmetric Encryption) > Self-Destructible Message Service (Once the message is read , it is destroyed and cant be decrypted again .)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    AESA

    All-purpose Encryption and Security Adaptation

    Starting as a personal study project, I have decided to share this security project. For now, it is a JAVA program that can be used to encrypt and decrypt simple file content (ie files), possibly later evolving into a utility with user interface and/or a library
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Tetris Puzzle Solver

    Tetris Puzzle Solver

    Fills a rectangle using given tetris shapes

    Fills a rectangle using given tetris shapes (tetraminos) using an optimized brute force algorithm. A puzzle can have many different solutions; this solver will stop at the first one. Not all puzzles are solveable. Created to solve the annoying tetris puzzles in The Talos Principle and Sigils of Elohim.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Java CoreWars Evolver

    A Java based, pMars compatible, CoreWars simulator with GA

    A Java based, pMars compatible, CoreWars simulator with Genetic Algorithm warrior evolver functionality. Java 8 is needed. See [Wiki:Tutorial]
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.