Search Results for "encryption algorithm java" - Page 16

Showing 1082 open source projects for "encryption algorithm java"

View related business solutions
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
    Click to perfect your product now.
  • Turn Your Content into Interactive Magic - For Free Icon
    Turn Your Content into Interactive Magic - For Free

    From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.

    Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
    Start Free Forever
  • 1
    Impact Finite Element Program
    Impact is an explicit Finite Element Program Suite which simulates dynamic impact events. It has a range of elements, contact handling and different material laws. Models can be created, solved and analyzed with the included pre- and postprocessor. Impact is based on an Explicit Time stepping algorithm. These kind of codes are used to simulate dynamic phenomena such as car crashes and similar, usually involving large deformations.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    FALCON - Text Search Java Project

    FALCON - Text Search Java Project

    JSON based text search Java Project

    ----------------- - What is it? - ----------------- The "Falcon Search" is a JAVA API and tool to search inside the documents. It was originally started to search the content in pdf files under the project "HAWK Search". Searching with this tool is query-based not word-based as in most of the document search tools OR document readers. It also takes care of jumbling of words within query and spelling mistakes. Commonly used techniques in this project are Natural Language...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    FSA is a probabilistic multiple sequence alignment algorithm which uses a "distance-based" approach to aligning homologous protein, RNA or DNA sequences.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    JFool

    Famous Russian card game

    Famous Russian card game. Currently only one human player is supported. Virtual players are programmed with simplest possible algorithm so it must be easy to defeat them. This is alpha version and there may be bugs especially if you start a new game instead of restarting the application. Cards Images were taken from wikipedia (I hope it does not contradict their license).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Sales CRM and Pipeline Management Software | Pipedrive Icon
    Sales CRM and Pipeline Management Software | Pipedrive

    The easy and effective CRM for closing deals

    Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
    Try it for free
  • 5
    Similarity Algorithm based on WikipediA
    SAWA calculates a semantic similarity coefficient between two sentences. Coefficient is expressed between "0" and "1", where: 0 means there is not semantic similarity among them; 1 vice versa.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    JBernstein

    JBernstein

    JBernstein: Exploration techniques for non-linear constraint checking

    JBernstein is a tool implemented in Java that enables to check whether a polynomial constraint holds for all variables within their domain. It is mainly used in the verification or synthesis of cyber-physical systems where the system model is nonlinear. The tool also supports specifications in assume-guarantee style. The underlying algorithm is based on a translation to Bernstein polynomials, and several optimization techniques are implemented to ensure efficiency. Concerning performance...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    AESTextCrypt is an easy-to-use open source tool for text encryption and decryption. Primarily intended for use with email, use it wherever you need to protect text from prying eyes. The encrypted text can be copy/pasted into any text-handling application (e.g. email) instead of plain text. Convenience buttons are provided for clipboard operations. AESTextCrypt uses AES-256 bit encryption which is the strongest available encryption scheme. It also employs bcrypt, which implements key...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    SecuXabber

    SecuXabber

    A secure Jabber-client for Android using strong encryption

    ...-to-end encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Graphal

    Graphal

    Graph algorithms interpreter, IDE, debugger, 3D visualizations.

    Graphal is an interpreter of a programming language that is mainly oriented to graph algorithms. There is a command line interpreter and a graphical integrated development environment. The IDE contains text editor for programmers, compilation and script output, advanced debugger and visualization window. The progress of the interpreted and debugged graph algorithm can be displayed in 3D scene.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 10

    JCycles

    [frozen] A library for computing cycles in graphs or in Java code.

    [This project is frozen, but has an offspring with more features: https://github.com/jeffhain/jadecy ] JCycles provides treatments to compute cycles, or just strongly connected components, in directed graphs in general, or in classes or packages dependencies graphs parsed from class files (major version <= 51, else does best effort). It uses Tarjan's algorithm for SCCs, and Johnson's for cycles, with continuations instead of recursion, which allows to handle large graphs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Bin Packing with Genectic Algorithm

    Bin Packing with Genectic Algorithm

    Bin Packing problem solved using Genectic Algorithm

    This project contains a solution for a Bin Packing problem solved using Genectic Algorithms. The code in the project was created as a solution for a problem in a combinatorial optimization class at the Univeridade Federal do Rio Grande do Sul (UFRGS - Brasil) in 2007.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    MySecureShell is a sftp-server developing tool which help to make a ftp server like proftpd but very securised with SSH encryption. This software is highly configurable and very easy to install and use. Project has moved to https://github.com/mysecureshell/mysecureshell !
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    cmotif

    A method for mining conditional phosphorylation motifs

    Phosphorylation motifs represent position-specific amino acid patterns around the phosphorylation sites in the set of phosphopeptides. The discovery of phosphorylation motifs is a very valuable work in bioinformatics. Although several algorithms have been proposed to uncover phosphorylation motifs, the problem of efficiently discovering a set of significant motifs with sufficiently high coverage and non-redundancy still remains unsolved. In this paper, we propose an algorithm called C-Motif...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Encrypt

    Allows you to encrypt files and plain text, then back again.

    Encrypt is a small application which allows you to encrypt your files and even write plain text to be encrypted in GZIP code so it effectively cannot be read by humans. Your note passing, personal diary and more is safe. As well as that, it can decode your GZIP messages back into plain text so it can be read again. It is written entirely in Java, and is very easy to use. For more information on this application, please refer to my YouTube tutorial or send me an email at romejanic@gmail.com...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    JConstraints

    JConstraints

    Java Framework to implement solutions to solve constraints problems

    JConstraints is a Java Framework that enables implementations of advanced solutions for combinatorial problems as constraints satisfaction problems. The architecture was built thinking in the constraints satisfaction paradigm. The Framework is easy to use. Therefore, with few interfaces implementations you can already run advanced combinatory solutions. Just to name a few algorithms, the Framework can solve any constraints problems using: - Regular Backtracking; - A variety...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    CalPCS

    CalPCS

    A pitch class set analyzer.

    CalPCS is a free pitch class set calculator software. System requeriments: Java Runtime Environment 1.6 or above. Screen of at least 800x600px. Optional: A Java Sound Bank. The program displays for each set their normal order, classification, transposition, whether it is an inversion, prime form, interval vector and the invariant property.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Java-based Open Source WAF (Web Application Firewall) to include inside a web application in order to protect it against attacks like Cross-Site Request Forgery (CSRF), Parameter Manipulation and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    algorithmic trading testing

    Testing framework for structures regarding performance.

    Framework for testing of various java structures regarding performance. Eg. comparison of arrays vs list. Performance of structures is crucial when building software aiding algorithmic trading. In area of algorithmic trading, especially in high frequency trading. In high frequency trading (HFT) it is all about latency. Software which supports this kind of operations has to introduce lowest possible latency by itself. Therefore analysing every possible element that may introduce latancy...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Brute-Force Sudoku Solver

    Java, Brute Force, Recursive Sudoku Solver

    This program prompts the user for a text file containing puzzle data, attempts to solve the puzzle using a brute force algorithm, and prints the solution along with the time it took to solve. I've included 3 sample puzzle files in the "res" folder. "Sub-box width/height" refers to the dimensions of the inner boxes in the puzzle. For example, a 9x9 puzzle has 9 3x3 sub-boxes. The 6x6 puzzle that I've included has sub-box dimensions of 3x2. This version does not contain any GUI components, so...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    HAWK - PDF Text Search Java Project

    HAWK - PDF Text Search Java Project

    No more support for this project - TAKE A LOOK AT FALCONSEARCH

    No more support for this project - TAKE A LOOK AT FALCONSEARCH "https://sourceforge.net/projects/falcontextsearch/"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    LoveCalculator

    LoveCalculator

    A Love Calculator with a Rich User Interface

    This is a Love Calculator with a rich user interface and animations made by using JavaFX. This application runs on Windows, Linux and Mac. Java 7 or later is required. Unlike the other Love Calculators found on Internet, this one does not generate random numbers. It uses a popular hand worked algorithm used by most of the school students. The Love Percentage is calculated by the process of listing the frequencies of each letter in the string "<Name1> LOVES <Name2>" and then adding...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Fileprivacy

    Fileprivacy

    Fileprivacy easily encrypts your files

    ... change the algorithm after setting the keylength. It has to be restarted for further use. Because there are no start scripts, yet, you have to start Fileprivacy from console by typing: java -jar Fileprivacy-1.0_<version>.jar ####### ALSO NOTE ####### The author of this software is not responsible for the safety of your data. There is no guarantee that one or more of the implemented algorithms cannot be compromised.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    An easy-to-use simulator for decentralized distributed scheduling in Clusters, Grids, and Cloud ecosystem MaGate 2.0 is now available from github! https://github.com/huangye177/magate
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    JCryptor

    JCryptor is an encrypting tool based on the Caesar-cipher.

    JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another. A keyshift of thirteen is called ROT13. ROT13 can be decrypted by encrypting it again with ROT13. Even today this simple method is used...
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.