Search Results for "encryption algorithm java" - Page 41

Showing 1081 open source projects for "encryption algorithm java"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights. Click to perfect your product now.
    Click to perfect your product now.
  • 1
    Jayenne is a modular, secure, scalable, easy to use and lightweight webserver wirtten in java, that supports encryption (SSL) and scripting languages like Perl.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SysK allows to crypt text by using system informations calculate the algorithm. For each user,the crypt algo will be different. It's written in C language for Linux x86. The objective is to allows it to crypt streams, binaries and more.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    A cross platform implementation of ECDSA (elliptic curve digital signature algorithm) interface to the aSuretee Token.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Java port and extension of MLC++ 2.0 by Kohavi et al. Currently contains ID3, C4.5, Naive (aka Simple) Bayes, and FSS and CHC (genetic algorithm) wrappers for feature selection. WEKA 3 interfaces are in development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    A Chinese chess Java Applet using alpha-beta game algorithm. The code can be easily used to program other chess game by changing the chess rules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Passkeyper is an encrypted password keeper program for the Sharp Zaurus and runs in the PersonalJava environment. It uses the legendary BlowfishJ implementation of Blowfish for encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A pure Java implementation of a constraint solving framework, relying on the stochastic approach of the Adaptative Search Algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A Java Swing application to 'securely' store passwords using symmetric encryption. A user can set up one or many 'datastores' of password/username combinations and commit them to disk. They are stored on the file system using PBE Blowfish.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    - development stopped! - GATMAN - The first known combination of a network/user administration and a groupware solution - Latest technologies such as JAVA,XML,JSP and strong encryption are used - Modular design, high scalability - Accessible by client an
    Downloads: 0 This Week
    Last Update:
    See Project
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 10
    Rijndog is an easy to use file encryption/decryption package making use of the Rijndael AES algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Hyperfile provides an easy-to-use and flexible interface to power and maintain highly dynamic user-defined data sources. The data sources are stored using a secure and reliable encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A collection of implementations of the Lovins stemmer as described in "Development of a Stemming Algorithm" by Julie Beth Lovins (published in "Mechanical translation and computational linguistics", 11:22-31, 1968).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    KCrypto is a KDE2 file encryptor. It uses the Rijndael ( block cipher algorithm AES winner ) public domain c++ class implementation written by Szymon Stefanek , and it is capable of encrypting and decrypting every kind of file ( text and binary ) i
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Domigene is a genetic algorithm API attempting to incorporate dominant and recessive genes. Supports modular evolution types, genetic programs, definable instruction sets, variation in population, chromosomes, mortality, mutation, fitness functions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13. Was star, now sectar.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    CryptoLib is a crypto library for PalmOS based on OpenSSL, which implements BlowFish algorithm, and is intended to support any other crypting algorithm in the future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The RAZip bitstream format was designed to provide a faster random access to compressed data than what is currently possible using the GZIP format. During the desing phase, some other features were added, like encryption and error correction.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    An API and test suite, or possibly an application unto itself, to manage keys and allow mail user agents (such as pine or mutt) to use encryption and authentication systems (such as S/MIME) via the services of external encryption suites (such as OpenSSL)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Distributed Genetic Algorithm framework (with projects). Uses java.rmi for networking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The goal of the Rats and Mazes project is to build a simple genetic algorithm to find general solutions to random non-cyclic single path mazes. I believe that the solutions will tend towards either the right/left-hand rule.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Secure Java Instant Messenger. Supports asymmetric key encryption of messages. will support multiple protocols (Jabber initially) and multiple UIs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This simplesudodu program is intend for studying in the sudoku solution algorithm rather than a game (If you want to make it a game, it's OK ^_^). Later I will implement the 4*4 or other kinds. Different sudoku requires different algorithm to solve.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A public web security that uses a Java applet for client-side for encryption and decryption. This server-side component is currently Java only, but are seeking to implement this in other languages and implement other encryption algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The iText based PDF sCramblEr allows you to encrypt a PDF using one or more public certificates of the addressees (one or more .cer files). For each .cer file, you can enforce specific PDF permissions: (dis)allow printing, (dis)allow modification,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    An elevator Algorithm analysis and design tool. The main goal of the project is to provide a platform to compare elevator control algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.