Search Results for "encryption algorithm java" - Page 21

Showing 1081 open source projects for "encryption algorithm java"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • 1
    spantus
    Spantus - signal(speech) analytical tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    iPassword Generator

    portable password generator

    iPassword Generator is a free, lightweight and portable Windows application designed to create a strong and unique password for each of your applications or online accounts from the keyfile you selected using a technology called Tabula recta. In addition, you are allowed to encrypt and hide your keyfile inside any other file with the AES-256( Advanced Encryption Standard ) algorithm. The main difference between iPassword Generator and other password creators is that, the passwords created...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    HTML Encrypter

    HTML Encrypter

    Java based HTML encrypter and decrypter

    An encryption and decryption application developed in Java. The application uses a number of algorithms to encrypt and decrypt the HTML source code: Blowfish, AES, TEA, Rabbit, MARC 4, Escape/Unescape functions. In addition to the encryption and decryption functions, the application also returns the source code of a website. The user has the ability to upload the encrypted file, using the FTP transfer feature, to his or hers personal website. Additional features are listed below.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Here are implementations of the Dual Contouring algorithm (SIGGRAPH 2002, see http://www1.cse.wustl.edu/~taoju/research/dualContour.pdf). The C++ code was co-developed by Tao Ju and Scott Schaefer, and Java port is done by Jean-Denis Boudreault.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Sales CRM and Pipeline Management Software | Pipedrive Icon
    Sales CRM and Pipeline Management Software | Pipedrive

    The easy and effective CRM for closing deals

    Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
    Try it for free
  • 5

    NitroCache

    Extremely fast, scalable, concurrent, pure Java In-memory cache

    One of the fastest, 100% Pure Java In-memory cache. Its aimed at providing very fast, light, highly scalable cache with high concurrency. The fetch operation from cache are always in constant time, O(c), irrespective of the number of threads accessing the cache or cache size. NitroCache uses unique custom algorithm inspired by Btree, skiplist and hashing to deliver a constant time cache with lock-less fetches. For details on using NitroCache, please visit wiki section Note...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Galois sub-hierarchy builder

    Visualize Galois sub-hierarchy of 2d matrix

    GSH builder is a free Galois Sub-Hierarchy visualization tool. The algorithm for calculating GSH is called Pluton and the present Java realization is based on two articles. "Efficiently computing a linear extension of the sub-hierarchy of a Concept Lattice" by Anne Berry, Marianne Huchard, Ross M. McConnell, Alain Sigayret and Jeremy P. Spinrad. "Performances of Galois Sub-hierarchy-building algorithms" by Gabriela Arevalo, Anne Berry, Marianne Huchard, Guillaume Perrot...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A cross platform steganography software written completely in java, with a juicy AES support. The project is pretty extensible, so new smarter steganography algorithms's are fully implementable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Sudoku Cracker

    Sudoku Cracker

    Sudoku puzzle cracker with User Interface (Java)

    Sudoku cracking algorithm with a convenient user interface with drop down options to fill up the grid. (Java platform)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Stegno

    This project is created for providing basic stegnography concept.

    THESE PROGRAMS JUST PROVIDES BASIC Stenography CONCEPT. ENCRYPTION 1. RUN Encryptor.CLASS (WITH APPROPRIATE JAVA ENV.) 2. PROVIDE APPROPRIATE PARAMETERS. • source_file_name : (NAME OF FILE TO WHICH target_file_name IS TO BE EMBEDDED) • target_file_name : (NAME OF FILE WHICH SHOULD BE EMBEDDED ) • output_file_name : (NAME OF OUTPUT FILE) e.g. java Encryptor original.mp3 hideme.mp3 hidden.mp3 (space will be used for separating parameters) [source_file_name] [target_file_name...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
    Click to perfect your product now.
  • 10
    Java implementation of Shamir's Secret Sharing algorithm as described in Applied Cryptography [as LaGrange Interpolating Polynomial Scheme].
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Genetic Basis

    A general genetic algorithm framework

    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    BayesianCortex

    BayesianCortex

    simple algorithm for a realtime interactive visual cortex for painting

    A paint program where the canvas is the visual cortex of a simple kind of artificial intelligence. You paint with the mouse into its dreams and it responds by changing what you painted gradually. There will also be an API for using it with other programs as a general high-dimensional space. Each pixel's brightness is its own dimension. Bayesian nodes have exactly 3 childs because that is all thats needed to do NAND in a fuzzy way as Bayes' Rule which is NAND at certain extremes. NAND can be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    CRF is a Java implementation of Conditional Random Fields, an algorithm for learning from labeled sequences of examples. It also includes an implementation of Maximum Entropy learning.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14

    WiFi Location Tracking

    Location tracks objects based on SSID strength in 2D environments

    This simple algorithm gives an example of location tracking in indoor environment using WiFi signals strengths sent to a local sever machine which then determines the clients location.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Bracer

    Bracer

    Repository has been moved to: http://dtitov.github.com/bracer

    Java library for parsing and evaluating math expressions. Javadoc is available at http://bracer.sourceforge.net/javadoc/ P.S. This library depends on Apache Commons Math, so don't forget to include commons-math-2.2.jar to your project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Recursive to Iterative in Java

    Recursive to Iterative in Java

    converting java recursive methods to iterative ones. for educational purposes ,i didn't say much about the algorithm because this can be an interesting field of research for B.S. students.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    JCRCGen

    JCRCGen

    Generates Java source code for the CRC algorithm.

    JCRCGen is a tool written completely in Java that will output public domain Java source code containing both the simple and table-driven implementations of the Rocksoft Model CRC algorithm. Generator polynomials may be any 8-bit multiple between 8 and 64 bits.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Tcp/Ip API Wrapper

    TCP/IP API (SSL Encryption, ZLIB Compression)

    TCP/IP connectivity warpped in an API extended to provide the following major features: SSL Encryption, ZLIB compression, packet oriented mode rather stream oriented mode. Asynchrounous. One liner to declare server or connect to server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Rcrypto

    Rcrypto

    Encryption Tool

    Rcrypto is the encryption and decryption software for windows XP,vista and 7 to keep your data secure from unauthorized users. It uses the highly secure algorithm to encrypt every byte of the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A library written in Java and C# for crypt,encrypt and generate key pairs using the ElGamal algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    KonEncriptación

    KonEncriptación

    Encryption tool for Dropbox

    It's a new, free distribution encryption software that provides Dropbox users with additional security for their sensitive information. Encrypt and securely share your files with other KonEncriptación users via Dropbox. KonEncriptación is fully integrated with Dropbox and is easy to use, thus allowing you to exploit all its features from the start.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    OpenSource Java based cross platform command line file encryption software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    RSAmake

    RSAmake

    An Cryptography software with RSA algorithm

    An Cryptography software with RSA algorithm RSAmake using Python and WxPython written
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    JAKIM Halal Logo Recognition System

    JAKIM Halal Logo Recognition System for Android

    The present invention is an application for Android platform that recognizes Jakim’s Halal logo and acknowledge users whether certain logo is Jakim’s Halal logo or not using embedded system technology, real-time processing, computer vision, pattern recognition, and machine learning algorithm just by taking the picture of any Halal logo.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    SimpleHTTPDB is a client based key-value database that allows for storing data on any http-server via FTP. This way, no server-based functionality is required. Security of the data is provided by high-level encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.