Search Results for "encryption algorithm java" - Page 28

Showing 1081 open source projects for "encryption algorithm java"

View related business solutions
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • Test your software product anywhere in the world Icon
    Test your software product anywhere in the world

    Get feedback from real people across 190+ countries with the devices, environments, and payment instruments you need for your perfect test.

    Global App Testing is a managed pool of freelancers used by Google, Meta, Microsoft, and other world-beating software companies.
    Try us today.
  • 1
    IKEv2
    Encrypted Message Exchange by using Diffie-Hellman key exchange algorithm and Advanced Encryption Standard(AES) encryption algorithm with Cipher-block chaining(CBC) mode using User Datagram Protocol(UDP)port server-client application in C, Ansi-style
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A particle swarm optimization demo written by students in the digital communication msc program (2010) at uni-kiel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    TaxonFinder is an application that annotates taxon found in literature. The application harnesses a hybrid algorithm that is necessarily a combination of morphological analysis, dictionary lookup and Levenstein Distance algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JHippo primarily hosted on https://edge.launchpad.net/jhippo , and is cHippo Reprogrammed in Java using the pircbot api, the same goals for cHippo are in mind with this project, a modular irc bot with built in scripting functionality.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    weka outlier is an implementation of outlier detection algorithms for WEKA. CODB (Class Outliers: Distance-Based) Algorithm is the first algorithm developed using WEKA framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Maui is a multi-purpose automatic topic indexing algorithm. Given a document, Maui automatically identifies its topics. Depending on the task topics are tags, keywords, keyphrases, vocabulary terms, descriptors or Wikipedia titles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This projet try to develop an object persitence framework (MicroObject) for java me/MIDP, allowing password protection and data encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A encryption library for C++ "DEL-X" that uses a 3d encryption algorithm. It can work with any key size from 8bit- 4096bit with a 512 byte block size.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A GPS simulator created in java. It contains a graphical interface and the shortest path will be found using Dijkstra algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
    Click to perfect your product now.
  • 10
    If you need to protect your confidential files in office or shared desktops, here is the robust command line and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A small program written in java which helps you to manage your passwords in a secure way. Stores all your passwords so you only have to remember one single master password. You can create multiple profiles. 128 or 256 bit AES encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This is the extended euclidean algorithm implemented in haskell. It will put every single step of the algorithm in a file and show the actual result and everything in between.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Reversi game with minimax algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This project is use full for student , project is developed by means of java swing ,here the cpu is stimulated by means of how it handles the multiple process at a time by means of different scheduling technique like FCFS,SJF,PSJF,RR etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The goal of the project is to create an example of Java ME based application for SMS message encryption. This aplication is only of academic interest and is not suitable for real safe SMS encryption.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Open KeyManager aims to provide a robust Key management server for the secure storage of private encryption keys. Open KeyManager seperates the user from encryption data using a simple API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    M.A.N.G.
    Marc's Awesome Name Generator is a Java based library to allow the easy and fast generation of random first, middle and last names based on user-definded criteria, such as culture of origin or contained letters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This library provides two operations: one to wrap key data, and another to unwrap the key data. This code also includes a fairly comprehensive unit test library which ensures the implementation is verified against the vectors provided in RFC 3394.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Rinecrypt uses the Gladman implentation of the AES algorithm Rijndael and a SHA256 hash among other things, to encrypt/decrypt a file with a user supplied passsword.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Encrypt and decrypt text with my own encryption algorithm. (Executable included)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    This is a reference implementation of snoBAC, a Bayesian Classifier designed to predict box H/ACA snoRNAs in Caenorhabditis nematode genomes. For details of algorithm and data, see Wang and Ruvinsky (2009) RNA in press.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Identification of biological species via iterational process of giving an ordered set of questions to user. The order is defined by an optimization algorithm, trying to provide the most correct prediction about the questions to ask.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Vijner 974 E-Sys (2048 bits and unlimited encryption). Enables easy (un-)encryption from text input or .txt file, and to (un-)encrypt raw files, with Vigenère Algorithm + unlimited encryption keys. Simple and powerful. Adapt to fit your needs.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.