Search Results for "encryption algorithm java" - Page 12

Showing 1092 open source projects for "encryption algorithm java"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1

    CryptoDoctor

    Easy encryption and decryption of Texts

    CryptoDoctor is a simple but powerful tool to encrypt and decrypt texts. It is currently available in german language. Moved to GitHub.com: http://saladan.github.io/CryptoDoctor
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Rootvole

    a text parsing library that matches text with concepts.

    For general processing of voice queries we developed a text parsing library named 'Rootvole' that can be used to match text with semantic concepts. The algorithm was implemented in Java and can be described as a form of a parsing expression grammar, where we generate the expressions to be detected beforehand by regular expressions and store them in a vocabulary. The central class is the parser class, which is instantiated as a series of vocabularies, simple text lists that describe tokens and synonyms, and value descriptors. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Jafaran

    Fast and more random implementations of java.util.Random.

    ...Also provides an implementation of Ziggurat algorithm (based on J. A. Doornik paper, 2005), used by nextGaussian() methods of the provided implementations. Requires Java 5 or later. Also available on github since 2015/12/13: https://github.com/jeffhain/jafaran Principal classes: - Implementations using Mersenne-Twister algorithm (good pseudo-randomness): MTSyncRNG MTSeqRNG - Implementations using Marsaglia Xor-Shift (fast): MXSIntSeqRNG (32 bits) MXSLongSeqRNG (64 bits) (nextLong() faster, larger period) - Ziggurat: Random-based implementation of Ziggurat algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    AES256 Password manager Russian version

    Simple password manager in Russian

    Simple password manager that uses encryption AES 256. Translated into Russian. AES256 Password Manager (originally Encrypter) decoder is a text file that stores the passwords or other sensitive data is completely secure manner using encryption algorithm AES 256-bit. Official page http://xn--90abhbolvbbfgb9aje4m.xn--p1ai/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B8/aes256-password-manager-%D0%BF%D1%80%D0%BE%D1%81%D1%82%D0%BE%D0%B9-%D0%BC%D0%B5%D0%BD%D0%B5%D0%B4%D0%B6%D0%B5%D1%80-%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B5%D0%B9.html Autor twitter: https://twitter.com/mrkaban546
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    ZipSnapNG

    ZipSnapNG

    Portable multi-platform backup tool with advanced features

    ZipSnapNG is a portable multi-platform backup tool which, despite its simplicity (200Kb and no installation required), provides advanced features such as incremental backup, data deduplication, encryption and configurable retention. It may run through the command line or within a graphical interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Animal-AV

    Animal-AV

    Animal Algorithm Animation System

    Animal is a Java-based system for visualizing and animating algorithms and data structures. Available since 1999, it is one of the established AV systems, and provides one of the largest collections of supported algorithms. Animations can be generated on the fly based on user input - for a large selection of algorithms and topic areas, including, but not limited to, the topic areas of backtracking algorithms, compression, cryptography, basing, searching and sorting.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Round Robin Scheduling Simulation
    It is programmed using Queue on JAVA You can change CPU Burst, CPU Speed, Add Process manually, ON/OFF
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    GA-EoC

    GeneticAlgorithm-based search for Heterogeneous Ensemble Combinations

    In data classification, there are no particular classifiers that perform consistently in every case. This is even worst in case of both the high dimensional and class-imbalanced datasets. To overcome the limitations of class-imbalanced data, we split the dataset using a random sub-sampling to balance them. Then, we apply the (alpha,beta)-k feature set method to select a better subset of features and combine their outputs to get a consolidated feature set for classifier training. To...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    CrypSten

    A Hybrid Cryptosystem with Steganography DLL

    A library written in Visual C# for encrypting a text message into an image file, and decrypting an image file to get the text message using Rijndael Algorithm, RSA Algorithm, and LSB Substitution Algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Java implementation of John Platt's Sequential Minimal optimization algorithm. This is an efficent Support Vector Machine solution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Java Card PKI Applet

    Java Card PKI Applet

    JavaCard/smart card implementation of the ISO7816 and PKI standard

    This is an open source Java Card implementation of the ISO7816 and related PKI standards. An ISO7816 file system for storing PKI files according to the Part 15 of the ISO7816 specification [3]: private key directory, certificate directory, CA and user certificates, etc. Download all files, you can visit:
    Downloads: 9 This Week
    Last Update:
    See Project
  • 12

    vtrunkd

    Network link bonding/trunking/aggregation and multichannel VPN daemon

    vtrunkd - network link bonding and multichannel VPN. Vtrunkd is a Linux VPN daemon used to combine several connection paths into one aggregated channel. Features latency, reordering and jitter management, behaviour analysis optimizations for encapsulated protocols, bufferbloat control, packet redundancy, and multiple cpu cores utilization. Up to 30 heterogenous links bonding supported. Used for live streaming, LTE/3G/Wi-Fi link bonding. 32/64-bit, x86, MIPS and ARM supported. Supports python...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Arbaro is an implementation of the tree generating algorithm described in Jason Weber & Joseph Penn: Creation and Rendering of Realistic Trees
    Downloads: 8 This Week
    Last Update:
    See Project
  • 14

    BlackBoxSocket

    My twist to a Java based secure layer for socket communication.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    LDWM: Hash-Based Signatures (draft-mcgrew-hash-sigs-02), PHP implementation of IETF pqcrypto algorithm specification
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    jPass - Cross-Platform Password Manager

    jPass - Cross-Platform Password Manager

    Compiled into a single .jar file. Tiny Password Manager. Portable

    I did not see a pre-built version of this software on the original developers Github project (https://github.com/gaborbata/jpass), so I am taking it upon myself to compile the releases as they come, so that others don't have to. --Description-- JPass is a simple, small, portable password manager application with strong encryption. It allows you to store user names, passwords, URLs and generic notes in an encrypted file protected by one master password. I will not add the source...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Open Simplex Project

    Open Simplex Project

    A Simple GUI Implementation of the Simplex Algorithm

    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A P2P overlay construction toolkit, which supports routing algorithm researchers in addition to application developers. It provides multiple routing (DHT) algorithms such as Chord, Kademlia, Koorde, Pastry and Tapestry, and a distributed environment emu
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    nogotofail

    nogotofail

    An on-path blackbox network traffic security testing tool

    nogotofail is a network security testing tool developed by Google to help developers and researchers identify weaknesses in TLS/SSL implementations and detect unencrypted traffic that could compromise sensitive data. The tool functions as an on-path man-in-the-middle (MiTM) testing system, allowing users to inspect and evaluate how applications and devices handle encrypted connections under real-world conditions. It can detect a wide range of vulnerabilities, including improper SSL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    cvault

    credentials vaulting solution for U*IX & Posix systems

    ...This solution prevents any hard-coding login informations in clear in scripts/programs. Based upon distribution center daemon associated with standard Opensource database back-end and end-to-end encryption. Manageable through lightweight java application beside U*IX CLI utilities as well. Fully new revamp of the previously "nprds" project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    TreeLayout

    TreeLayout

    Efficient and customizable TreeLayout Algorithm in Java, for NetBeans

    Efficiently create compact, highly customizable tree layouts - Based on Walker's algorithm with enhancements suggested by Buchheim, Jünger, and Leipert the software builds tree layouts in linear time. I.e. even trees with many nodes are built fast. Downloads are available at https://sourceforge.net/projects/treelayout/files/. For detailed documentation look at the TreeLayout web site http://treelayout.sourceforge.net/. Development for TreeLayout has moved to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    DE-HEoC

    DE-based Weight Optimisation for Heterogeneous Ensemble

    We propose the use of Differential Evolution algorithm for the weight adjustment of base classifiers used in weighted voting heterogeneous ensemble of classifier. Average Matthews Correlation Coefficient (MCC) score, calculated over 10-fold cross-validation, has been used as the measure of quality of an ensemble. DE/rand/1/bin algorithm has been utilised to maximize the average MCC score calculated using 10-fold cross-validation on training dataset. The voting weights of base classifiers are...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Enigma_3

    A substitution-based encryption algorithm for binary data or text

    Enigma3 is a substitution-based encryption algorithm that can be applied to binary or text data and results in far greater security than traditional encryption. An electronic dictionary of words is employed and numeric codes are then assigned to each word within the dictionary. Communications are coded as a set of numeric codes which can then only be translated back into the original message by using the original coded dictionary.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    GeneticAlgorithms

    Framework for using the Genetic Algorithms optimization heuristic.

    GeneticAlgorithms is a simple and lightweight framework to implement an optimization heuristic following the Genetic Algorithms model. A genetic algorithm mimics the natural processes of evolution, selection and "survival of the fittest". This framework is intuitive and good integrated with Java 1.5 SDK and later.
    Downloads: 1 This Week
    Last Update:
    See Project