Search Results for "encryption algorithm java" - Page 18

Showing 1081 open source projects for "encryption algorithm java"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • 1

    Face Recognition Based Login Assistant

    Login to Websites Automatically Using Your Face as Password

    ... in to user accounts. The Viola - Jones Algorithm presents a novel face detection technique, we would implement this technique for face detection and then use eigen faces method to recognize the person in the image. Once recognized the person can easily sign in to any applications without the need of typing passwords or usernames.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    sfxcompress
    The utility sfxcompress is a bash script used to pack and encrypt the current directory on a self-extracting file. It also includes the calculation of the MD5 function to check if the compressed file is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    sqlite3fish

    Another encryption solution (with Blowfish algorithm) for SQLite3

    The sqlite3fish is another encryption solution for sqlite3. It is based on some source code of botansqlite3(https://github.com/OlivierJG/botansqlite3) . But it does not need Botan library, it uses Blowfish algorithm to encrypt/decrypt the database file. This library only depends on the source code(no-modify) of SQLite3, it is clean and easy to compile. But currently it only supports the version 3.7.0 of SQLite3 (http://www.sqlite.org/sqlite-amalgamation-3_7_0.zip) .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The Java RTree project aims to maintain an Java version of the RTree spatial indexing algorithm. See http://jsi.sourceforge.net for more information, and http://github.com/aled/jsi for latest development code.
    Leader badge
    Downloads: 1,455 This Week
    Last Update:
    See Project
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 5
    FileManESI

    FileManESI

    File manager software

    FileMan is a file manager software that allow users to apply multiple functions to all kinds of files such as : AES encryption/decryption, zip archiving, file spliting/merging , file comparison.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Mjolnir

    Java code for brute forcing keystore certificates

    Mjölnir is a a java-based brute force algorithm for obtaining keystore passwords by brute force. It is multi-threaded
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Approximate Subgraph Matching Algorithm

    Approximate Subgraph Matching Algorithm for Dependency Graphs

    ..., the total worst-case algorithm complexity is O(m^n * n(n-1)/2 * km * log m). This Java implementation implements our ASM algorithm. See README file: https://sourceforge.net/projects/asmalgorithm/files/ If you use our ASM implementation to support academic research, please cite the following paper: Haibin Liu, Lawrence Hunter, Vlado Keselj, and Karin Verspoor. Approximate Subgraph Matching-based Literature Mining for Biomedical Events and Relations. PLOS ONE, 8:4 e60954, 2013.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    ECG2HRV

    ECG2HRV

    import and store ECG, associate to clinical data, automatic HRV

    http://www.youtube.com/watch?v=AOzpNMC-FXU This multi-platform application will enable the user to import digital CSV ECGs at any sampling rate and store them in an encrypted local DB along with relevant clinical data of the patient. It also performs automatic QRS complex detection and RR interval classification showing the output in a visual chart that the user can edit to correct sources with artifacts or pats with bad detections. This project was developed using Netbeans 7.3...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9

    java quickShort

    quick short in java

    This simple shorting large data from file using quickshort algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
    Click to perfect your product now.
  • 10
    NeSSi2

    NeSSi2

    Network security simulator

    At the moment NeSSi² is not actively maintained anymore since we are planning a successor project. NeSSi² is a network simulation tool suite addressing in particular network security aspects. Sample capabilities are profile-based attack generation, traffic analysis and support for attack/malware detection algorithm plugins.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    Low latency trading platform

    The documents for my achievements of the low latency technology

    Ultra-low latency trading platform MFC/Socket/Nios II/UcOS/FPGA Float Algorithm/Martlab/Simple FIX protocal FPGA Moving Average algorithm and performance evaluation with Marlab result. Fast response in the stock market Flash Crush situation. Stock exchange client Java RCP/Apache_Active_MQ/Plugins/QuickFIX/SLF4J/XstreamApache_LOG4J To see how the software trading client work. Through this way, I made deep understanding to how we can reduce the trading latency based on FPGA technology...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    F-Talk P2P Encrypted Secure Voip

    F-Talk P2P Encrypted Secure Voip

    F-Talk cross-platform p2p encrypted secure voip software

    This project connect to two peers directly ( using without any central server, stun server ) together with 128bit encrypted secure voip communication. http://ftalk.armanasci.com/guide Spefications * Peer to peer direct connection without using any central dedicated server. ( First basic part of the security ) * 128bit AES Symmetric end-to-end encryption PCM datas. ( Second basic part of the security ) * 64bit Base64 Encoding transferred server side info. * Ipv4 and Ipv6 Supoort...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13

    VIM cloud

    Web Based IaaS Cloud Controller (VimCloud)

    This is a pure IaaS cloud controller with all the basic functionality of IaaS Cloud Controller. This uses proposed “Trust Based Scheduling Algorithm and Load Balancing Algorithm”. It uses Cloud Architecture with Trust Management layer. It uses Qemu machine emulator and virtualizer as virtualization software at Host. It uses Libvirt driver [30] to interact with Qemu and to interact with its virtualization capabilities of a range of operating systems. Libvirt provides a common, generic and stable...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    MyZone Social Network

    peer to peer social network

    MyZone is a peer to peer social network that supports almost all features common in Facebook and Google+. In addition you can share unlimited mp3s and mp4s with your friends. MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking platform...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    MathParser Java - Math Parser library

    MathParser Java - Math Parser library

    Mathematical Parser for Java

    This project gives a mathematical parser for converting a simple string expression into a result which can be managed for using in other calculations, all in Java. Using a couple lines of code, you'll be able to parse complex arithmetic expressions efficiently. This library is powered by Dijkstra's Shuting-yard algorithm. The library has no dependencies with other external libraries. Dependency <dependency> <groupId>com.google.code.mathparser-java</groupId...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    This software uses a genetic algorithm to "evolve" reactor designs for Schema's space-simulation game, Star-Made (http://star-made.org/). One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    SecurePassG

    Creates Secure Passwords

    SecurePassG creates more secure passwords. It is based on what I understand about password criteria needed to thwart most password guessing software. When saving or writing down a password, you may want to encrypt it using an encryption software like Encrypto available under my profile. When saving your password, you choose the extension you want to use, .txt should be fine. In addition to the original Java version, there is also a Windows .exe version written in C# that currently doesn't...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Fylogenetica

    Constructing level-1-networks consistent with a set of quartets

    This project is an implementation of an algorithm by J. Keijsper and R. Pendavingh. The goal of the algorithm is to construct a phylogenetic level-1-network that is consistent with a given set of quartets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Document Analysis and Exploitation
    The Document Analysis and Exploitation Platform is a Drupal based web interface to a cloud enabled Document Analysis resource set.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    AESEncryptor is a fast and simple utility to protect your files with the Advanced Encryptation Standard algorithm. It is safer than zip or rar files because a simple force-attack can reveal their password. A force-attack to an AES encriptation could delay millions of years. There are available the source code of the GUI, a CaptionProgressBar and the RijndaelCryptorProvider, the core of the application which can start a encriptation process in a simple code line. New Version released (v2.5...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Semantic query optimization (SQO) is the process of finding equivalent rewritings of an input query given constraints that hold in a database instance. We present a Chase & Backchase (C&B) algorithm strategy that generalizes and improves on well-known methods in the field. The implementation of our approach, the pegasus system, outperforms existing C&B systems an average by two orders of magnitude. This gain in performance is due to a combination of novel methods that lower the complexity...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Anonymous File Transfer Network (AFTN)

    Send files securely and anonymously

    AFTN is a Peer to Peer network designed to allow its users to securely and anonymously transfer files to other members of the network by utilizing encryption and onion routing techniques. It is important to recognize that this is not a "File Sharing" network, nor is not intended as a means of distributing copyrighted or otherwise protected content illegally. Rather it is designed to provide anonymity, confidentiality and plausible deniability to those with a reasonable and legal need to do...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    DJDarwin

    DJDarwin

    A Genetic algorithm approach to creating beats.

    The program puts beats through evolution - survival, mutations, reproduction. The purpose, in the words of Africa Bambaataa - Looking for the perfect beat. Using a genetic­ algorithmic framework, the user's taste defines a Beat fitness function - she decides which beats survive and breed, and which join the choir invisible. In addition, the user can easily define an automatic fitness function, put the program on 'auto­pilot' mode, and let it speed up evolution. Different types of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 1 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.