Search Results for "encryption algorithm java" - Page 20

Showing 1092 open source projects for "encryption algorithm java"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1

    HIVCD

    Informatics tool for contamination screening in the HIV sequencing lab

    HIVCD is an informatics tool developed to identify patient sequences that are too similar to happen by chance alone. Highly similar sequences are likely to occur from contamination or other situations like geographic linkage. Full details can be found in our paper titled "Application of a new informatics tool for contamination screening in the HIV sequencing laboratory" The code provided is a simple user interface to the underlying algorithm. We provide it as a convenience but it comes...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    ME_DSS

    Microemulsion Decision Support System

    This application allow user to predict microemulsion region based on algorithm consisted of artificial neural networks and random forests. Those techniques combined create Decision Support System. Application was created as a part of project K/DSC/000033 subsidy for young researchers from Polish Ministry of Higher Education.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    cerrla

    The CERRLA algorithm, developed by Sam Sarjant

    This project contains the files required to run the Cross-Entropy Relational Reinforcement Learning Agent (CERRLA) algorithm. Note that a copy of the JESS rules engine will also be required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    This is an encrypter. It can be used to encrypt confidential information. Prefect for sending file over the Internet without others knowing the content of the file. The encryption algorithm used in this software is similar to the one that's used by espionage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Most language just provided pop data structure and corresponding algorithm. JDS(java data structure) is intend to append some datastruct and algorithm, mainly, in java language and c++.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    EmployeesProfileViewer is my MSc final project. Consists of an application to represent the employees of an organization in a graphic map according to personal skills, using their evaluations on the different competences which the company needs. This software generates a graphical representation of the employees in a 2D map of coordinates, that pojects each worker as a figure in the map. The geometric characteristics of each one of these shapes will tell us how are the skills of the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    textcrypter

    textcrypter

    textcrypter is an encryption tool using vigenere cipher algorithm

    Textcrypter is an encryption tool using vigenere cipher algorithm. Vigenere use the same key/password to encrypt and decrypt a file (symmetric key cryptosystem). Result of the encryption process is a ciphertext in hexa number.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Java Evolutionary Computation Library

    As of 2012-12-18, this project may now be found at Google Code.

    As of 2012-12-18, this project may now be found at http://http://code.google.com/p/paba JECO is a Evolutionary Computation Library deveoloped in Java. It includes a variety of evolutionary optimization techniques such as genetic algorithm, genetic programming, evolutionary mapping methods, particle swarm optimization, ant colonies, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Deliver trusted data with dbt Icon
    Deliver trusted data with dbt

    dbt Labs empowers data teams to build reliable, governed data pipelines—accelerating analytics and AI initiatives with speed and confidence.

    Data teams use dbt to codify business logic and make it accessible to the entire organization—for use in reporting, ML modeling, and operational workflows.
    Learn More
  • 10
    This is a GUI, Java implementation of the Ant Colony Optimisation/Particle Swarm Optimisation (PSO/ACO2) rule induction algorithm. This project was inspired by Ant-Miner, but handles continuous attributes using PSO or now Differential Evolution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    License Generator

    License Generator

    Java Library to generate license for your application.

    This is a free and open source java library to generate license for your application. Use this library to make your custom license file with your own extension. It encrypts the license file with the one time pads encryption technique to make it hard to break. The generated license file can be set to expire after certain time, and also can be set to expire manually after a certain action.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12

    Selective Data Backup (DoS App)

    Select the files you want backed up.

    ...Now, also included in this is my Password Safe program. Store all your passwords in 1 convenient location. But, wait "wouldn't that be dangerous?", NOPE! It's all encrypted useing my special Cypher Encryption Algorithm: basically, you have to have the password, or you'll never see your data again! This also means that ONLY YOU get to see your passwords/accounts. So, if you don't feel like memorizeing 47 accounts (like I), then download this thing! lol I included a random password generator to go along. Any length, include any characters! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ES-E

    ES-E

    Evolved Studios Encryption is a new platform of protection.

    ES-E is a fully downloaded encryption algorithm that you can use for your WebServer or use it for your programs (by grabbing the output off the webpage). Check the Files page for the latest build.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    mFileBinder

    mFileBinder

    An advanced file binder which binds multiple file of any type

    mFileBinder is an advanced file binder which binds multiple file of any type and merges into a single executable file. mFileBinder uses rijndael encryption algorithm to encrypt the file which can make Virus / Trojans Fully Undetectable. Set the drop location of all files and set the execution mode(Background,Foreground) of each file. Predefined set of ICON Package is included set your desired icon. Silently extracts and sequentially execute files.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    egrsa

    egrsa

    rsa-elgamal comparison

    compare time of process between rsa and elgamal algorithm used to encryption and digital signature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Chess Game AI Phantoms
    Phantoms Chess Where Pawns Can become Queens Chess Game is zero-sum two-player. Team Members: Phantoms Team * Leader Gehad Sayed Kaseb Gehad.Kaseb@gmail.com * Co-leader Rawia Ahmed * Research team Hagar Samir Safaa Mohamed * Design and Implementation team Ahmed Helal Aya Eid Aya Tarek Eman Saleh Fatma El zhraa Ibrahim Hanan Mohamed John Samir Mina Victor Nahla Ibrahim Samira Magdy Samr Ayman * Integration Team Marwa Ayman Nahla Essam * Interface...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Darwin 2: Java Framework for Evolutionary Computation (genetic algorithm, GA). A true framework with out-of-the-box functionality and extensibility of all classes. Interface-based pattern with dependency-injection to configure components.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    MyRouter

    MyRouter

    WiFi Hot Spot using WindowsXP, Windows 7 and 2008 R2

    MyRouter is a Virtual WiFi Router that takes advantage of the WindowsXP , Windows 7 and Windows 2008 R2 Virtual WiFi technology and simplifies the process of sharing your internet securely with other WiFi enabled device's with a few clicks.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 19
    Sentence Composer

    Sentence Composer

    Compose the writings semi-automatically

    Please click on "BROWSE ALL FILES" to open a README! What is this program? This program is meant to search the texts and suggest sentences that might follow any inputted sentence. It was meant to help composing the writings. How was it made? First, I made a chatterbot to understand the concept of "predicting" the next sentence (worked as good as the Cleverbot), then I made this program that is aided by an user to compose the new writings. SAMPLE: Input sentence was "Learning...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    MazeJen

    java maze generator

    MazeJen is a maze generator written in java which implements the Depth First Search algorithm, and can render mazes in both 2 and 3 dimensions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Web KeePass Password Safe
    Web AND Mobile (Apple iPhone) based, multi user, java port of the KeePass project. A free, easy to use password manager which helps you to manage your passwords in a secure way. Focused on deep encryption and ease of use.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22

    samizdat

    Kerberized Messaging Toolkit for Java

    Samizdat is a toolkit for Java for building Kerberos secured distributed, message-oriented applications. The toolkit contains base classes that simplifies the management of Kerberos login contexts as well as flexibly sign and seal messages between principals using the Java GSS API. The toolkit contains Transformation classes for Kerberizing JMS traffic as well as a super-lean HTTP based protocol stack that supports both Synchronous (RPC) and Asynchronous modalities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Exact Subgraph Matching Algorithm

    Exact Subgraph Matching Algorithm for Dependency Graphs

    ...This Java implementation implements our ESM algorithm. See README file: https://sourceforge.net/projects/esmalgorithm/files/ If you use our ESM implementation to support academic research, please cite the following paper: Haibin Liu, Vlado Keselj, and Christian Blouin. Exploring a Subgraph Matching Approach for Extracting Biological Events from Literature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    My Text is Treasure
    It is a simple password manager for your PC and Smartphone. It works like a text editor and uses a strong cryptography algorithm to generate the end file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Hanasu

    Hanasu

    A P2P Messenger which uses JXTA. It provides secure RSA/AES end-to-end

    Does not work because there is no master server! A P2P Messenger which uses JXTA. It provides secure RSA/AES end-to-end encryption and VoIP-Capabilities.
    Downloads: 0 This Week
    Last Update:
    See Project